Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

1.

TRUE /FALSE

1. PowerPoint is an application software. [1] True

2. LAN is faster than WAN. [1] True

3. Operating system is an application software. [1] False

4. Password should be exactly 12 characters. [1] False

5. Newsletters are essentially to be printed. [1] False

6. Software are the instructions that make the computer hardware work. [1] True

7. WAN stands for Wireless Area Network. [1] False

8. As nobody knows me, I don’t care to watch my language in social media. [1] False

9. Star Topology is not expensive. [1] False

10. To protect your computer, you must install an antivirus. [1] True

11. One of the big disadvantages of the internet is cyber-attack. [1] True

12. Windows is a type of Operating system. [1] True

13. Most common topology is the Mesh topology. [1] False

14. We need to identify date for the newsletter. [1] True

15. Plagiarism is an act of stealing. [1] True

16. PAN stands for Personal Area Network. [1] True

17. Data packets maximum size is 1 MB[1] False

18. Ring Topology passes the data in 2 directions. [1] False

19. Passwords are series of consecutive letters of numbers, capital, small and special character. [1]
True

20. Copyrights are exclusive to the commercial license. [1] False

21. Packet Header contains the IP Address of the sender.[1] True

Year 7 Computer Science 1


22. Packet trailer contains the IP Address of the receiver[1].False

23. Better to keep your password forever and not to forget it.[1] False

24. WAN is quicker than LAN.[1] False

25. Biometrics are another type than password to access sites. [1] True

26. You must have a hint for your password. [1] True

27. IPV6 carry more devices than IPV4[1] True

28. Bus topology is expensive. [1] False

29. Central Hub is in the Mesh topology. [1] False

30. WWW is the same as the internet. [1] False

31. Better to tell your friend your password as if you forget it they may remind you. [1] False

32. Cupper Cable is quicker than fiber optic cable. [1] False

33. All Cloud Servers have a known place. [1] False

34. Star network depends on a central server. [1] True

35. Bus Network has main central line. [1] True

36. The word extension is docx. [1] True

2.Circle the correct answer.


37. We can touch the………….. of the computer[1]
a) Software
b) Hardware *
c) Malware
d) All of the above

38. The extension of PowerPoint is:[1]


a) DOCX
b) XLS
c) MDB
d) PPT *

Year 7 Computer Science 2


39. PowerPoint covers[1]
a) Presentation *
b) Editing software
c) Documentation
d) Spreadsheet

40. IPv4 can distribute


a) 5,8 Billion
b) 4.2 Billion *
c) 6 Billion
d) 11 Billion

41. Half duplex is the data transmission:


a) One Direction only
b) Both Directions not at the same time
c) Both Directions at the same time
d) None of the above

42. A Safe website has a[1]


a) Star
b) Padlock *
c) Hyphen
d) All of the above

43. In your presentation you have to consider the audience[1]


a) Age *
b) hobbies
c) Weight
d) All of the above

44. Biometric can be (click all that apply)[3]

a) Face recognition *
b) Retina scan*
c) Footprint
d) Fingerprint*
.
45. One of the main advantage of the cloud is (click all that may apply)[3]
a) Backup *
b) Working without internet
c) Accessible anytime/anywhere *
d) Less resources on the device *

46. Linux is a type of : [1]

Year 7 Computer Science 3


a) Computer Game
b) Operating System*
c) Network
d) Application Software

47. You can access your cloud data through. [1]


a) USB
b) Internet *
c) VGA Card
d) HardDisk

48. Disadvantage of cloud (Click all that apply)[2]


a) You have to have strong internet *
b) Cyber attacks.*
c) Need high power consumption at your side.
d) All of the above

49. Internet covers (Click all that may apply)[2]


a) Cloud*
b) Social Media*
c) Cd/DVD
d) Hard disks

50. Google Chrome is[1]


a) application software*
b) System Software
c) Cloud Storage
d) Virus

51. Which one of these is a hardware[1]


a) Memory Stick*
b) Power Point
c) Internet Explorer
d) Windows Media Player

52. The part of the computer that sends sound to the computer is [1]
a) Microphone*
b) Speaker
c) Mouse
d) Touchpad

Year 7 Computer Science 4


53. The part of the computer that produces sounds is [1]
e) Microphone
f) Speaker*
g) Mouse
h) Touchpad

54. Transform from Binary to Decimal

00111010

128 64 32 16 8 4 2 1
2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0

Answer………………………………………58……….[2]

10011011

128 64 32 16 8 4 2 1
2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0

Answer…………………………………………155…….[2]

10101010

128 64 32 16 8 4 2 1
2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0

Answer……………170………………………………….[2]

55. Transform from Decimal to Binary

37

128 64 32 16 8 4 2 1
2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0

Answer………………00100101……………………………….[2]

Year 7 Computer Science 5


80

128 64 32 16 8 4 2 1
2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0

Answer…………01010000…………………………………….[2]

100

128 64 32 16 8 4 2 1
2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0

Answer……………01100100………………………………….[2]

56. State 3 usages of the internet [3]

a) …………Social Media…………………………………………

b) …………Video Straming………………………………………..

c)………………Search Engine……………….……………….

57. State 3 types of copyrights material [3]

a) ……………………………………Video………………

b) ……………………………………………Songs……..

a) Books……………………………...……………….

58. State the 4 network topologies:[4]

……Bus…………………………………….

…………Ring……………………………….

Year 7 Computer Science 6


………………Star…………………………..

……………………Mesh…………………….

59. Draw a star network Diagram.[2]

60. Draw a bus network Diagram.[2]

61. State one Advantage of ring topology

……………………Data flows in one direction so no


conflict……………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………[1]

Year 7 Computer Science 7


62. What is the role of the DNS?
IT transforms the static IP Address of the domain to a wording that can be easy typed on the
search
bar………………………………………………………………………………………………………………………………………..

63. State one Advantage of IPV6

……………………It carries much more devices than


IPv4…………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………[1]

64. State one Advantage of cloud backup

Low resources on your


machine……………………………………………………………………………………………………………………………………
……..

…………………………………………………………………………………………………………………………………………..[1]

65. State one disadvantage of Cloud backup

……………………Needs continuous internet to access


it……………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………………………………….[1]
66. What is a trusted website (secure)?

…With a pad lock and


https………………………………………………………………………………………………………………………………………..

…………………………………………………………………………………………………………………………………………..

…………………………………………………………………………………………………………………………………………..

…………………………………………………………………………………………………………………………………………..[2]

67. Differentiate between LAN and WAN [3]


LAN stands for Local Area Network
WAN Stands for Wide Area Network
LAN covers small geographical area.
WAN covers large geographical area.
LAN is safe and quicker than a WAN

Year 7 Computer Science 8


68.

Define the data types of the following elements:

Element Data types


Student Name String

Gender Char

School Fees Real

Parent e-mail String

grade Integer

Health issues (Y/N) Boolean

Pet Name String

Breed String

Age Integer

Vaccinated (Y/N) Boolean

Buying price Real

69. Unscramble the following word for a computer term

IGNDES DESIGN
TGERINTE INTEGER
GRINST STRING
-PDTOONW TOP-DOWN
LEBOANO Boolean

70. Transform the following into ASCII Decimal


“THANK YOU ”

Year 7 Computer Science 9


……84 72 65 78 75 89 79 85…………………………………………………………………………………………………..

71. .Unscramble the following word for a computer term

IGNDES DESIGN

TGERINTE INTEGER

GRINST STRING

-PDTOONW TOP-DOWN

LEBOANO Boolean

Year 7 Computer Science 10


72. .Draw a flowchart to reads two values, determines the largest value and prints the largest
value with an identifying message

Year 7 Computer Science 11


73. .Draw a flowchart to read a variable num1 = 7 and store the negative value of num1 in
another variable num2

The following are true/false questions.


74. In Python, a variable is used to store data values in memory.

75. Variables do not need to be declared with a specific data type.

76. Python variables can be assigned new values of different types without anyissues.
FALSE

77. Python variable names are not case-sensitive, so “VAR1” and “var1” refer tothe
same variable.

78. Using function names like “print” and “min” as variable names in Python is always
recommended to avoid conflicts. FALSE

79. Syntax errors are detected by the interpreter during the compilation process,
runtime errors occur while the program is executing, and logic errors are mis-takes
in the program’s algorithm.

Year 7 Computer Science 12


Click on the letter of the BEST answer in the box on the next page. Each problem
has a single answer.

80.What is the relationship between the values “25” and 25?


A. They are of the same type since they both represent the number 25.
B. They are of different types: “25” is a string, and 25 is an integer.******
C. They have different types, but they are interchangeable because Python treats
them as equivalent values.
D. They’re both funnier than 24.
81.How does the int() function work?
A. int() always rounds up to the nearest integer value.
B. int() rounds to the nearest integer value, always rounding up if the decimal
part is greater than or equal to 0.5.
C. int() truncates the decimal part of a float and returns the whole number
part.******
D. int() rounds to the nearest integer value, but if the decimal part is exactly
0.5, it rounds to the nearest even integer.

The following questions require you to trace the behavior of some Python code and identify
the output of that code. For each question, write the output for the code segment in the box
provided. Don’t worry about line breaks.

82.(3 points)

print(10 // 2)
print(10 / 2)
5 5.0

83.(3 points)

print(3 * 3)
print(3.3 * 3) # take a guess on this one
9 10

84.(3 points)

Year 7 Computer Science 13


x = 10
y= 3
result = x % y
print(result)
1

85.(3 points)

print(17 // 3 + 1.5)

6.5 print(17 // 3 + 1.5)

Year 7 Computer Science 14

You might also like