0% found this document useful (0 votes)
18 views15 pages

G7-ICT-EOS2 Revision - Part 2 - Questions

Uploaded by

teamalpaca33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views15 pages

G7-ICT-EOS2 Revision - Part 2 - Questions

Uploaded by

teamalpaca33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

q20.

Place each scenario in the correct column of the table below,


depending on whether it describes a PAN, a LAN or a W

A smart blood-
pressure monitor that
A multinational pairs with an app to A network of
company that shares track health statistics computers and
software and files devices that are used
between offices using by students and staff
a network in a school

A network that shares


A smart watch that is internet access that A chain of shops that
used by someone people can connect to communicates their
who likes to read their via Wi-Fi in an airport stock data and
emails on the go payments through
one network

1
Type of network

PAN LAN WAN

q21. Explain:
How firewalls protect a network and why they are
important?
ANS:

q22. How antivirus software and anti-spyware provide


protection to keep data secure on a network.

2
ANS:

q22. Categorise each of the scenarios below into the appropriate threat to a network.
You can write the letter that represents each threat in the correct position in the
table.
A A malicious user emails a file to a victim. When the victim has downloaded and run the
file, it has caused their My Documents folder to be deleted from their computer.
B A user is using an Instant Messenger on their Android device. They are sent a game file
called fungame.exe. The user downloads fungame.exe and runs it. Later that week, they
notice that their webcam is turning on and off by itself and mouse movements are
occurring without them touching their mouse.
C A user visits a website to download some software to enable them to edit images.
After installing the software, the home page on their internet browser has changed to
a new page. They notice that there are lots of advertising banners and notifications
happening on their device.

Adware Trojan Virus

q22. Look at the pseudocode below and annotate


(describe) the mistakes that have been made in how the
pseudocode has been written.
HINT: There are at least 5 mistakes.

3
ANS:

q23. Look at the pseudocode below. Create the flowchart to match it.
ANS:

4
q24. Describe how a linear search works on this data set to find the data item
‘Tiger’.
Cat Hamster Bat Parrot Horse Lion Tiger Camel Bear Swan

_______________________________________________________
____________________________________________________

5
_______________________________________________________
_____________________________________________________

q25.Sort the different inputs and outputs on the micro:bit into the
correct column of the table below.

A compass accelerometer touch temperature sensor


button sensor

buzzer microphone B button light sensor display

Input Output

q26. a. Look at the following pseudocode.


Explain what it shows.

6
__________________________________________________________
__________________________________________________________
__________________________________________________________

b. Develop and complete the following test plan for the pseudocode.
Test number Data entered Expected outcome Pass/Fail

q27. Which of the following is system software?


a. Application software
b. Operating System
c. A graphics/art design app
d. Entertainment software

q.28. Which of the following is NOT an example of utility software?

7
a. anti-virus software
b. racing game
c. compression software
d. backup software

q.29. Describe TWO functions of an operating system. (In this question, a "function" means:
a task that the operating system does)

q.30. Use the following words to complete the paragraph below to


describe how data is stored inside a digital device.
OFF ON electrical switches digits binary

Computers represent data using a combination of 1s and 0s. Data


stored in this format is known as ____________ data. This is possible
because of the way in which digital devices use ____________
signals to represent binary ____________. Each digital device is
made from millions of tiny ____________ called transistors. Each of
these switches can only ever be ____________ (1) or ____________
(0).

q.31. Write "TRUE" in the correct box below to show whether each
statement relates to RAM or ROM memory.
Statement RAM ROM

Volatile memory

Non-volatile memory

Having more of this type of memory can speed up processing

8
Content fixed at manufacturing

Close to the processor

Contents can be changed

Storing too much data or instructions here can slow processing


down

q32. Write TRUE or FALSE for each of the statements below about data
transmission.
Statement TRUE/FALSE

Compression always results in reduction of the file size

Compressed files require a larger bandwidth for transmission

Compressed files require a shorter data-transmission time

Moving images cannot be compressed

Compressed files must be decompressed at the other end before they can be
viewed again

Data compression reduces the number of 1s and 0s needed to represent


the data

q32. omplete the following paragraph about decomposition using the


words below.
combined easier independently breaking

multiple smaller different

Decomposition is the process of _______________ a problem down into _______________


sub-problems. Decomposition makes problems _______________ to solve and allows
_______________ people to work on _______________ parts of the same problem. As each
sub problem is solved, it allows this to be tested _______________ before being
_______________ to solve the full problem.

9
q.33 Using a computer to research something on the internet, then saving what you have found in a
word-processed document.

Order Instruction

Log on to the computer.

Complete your research.

Turn the computer on.

Log off.

Save your document.

Type your findings into the word


processor.

Open the web browser.

Open the word processor.

Unit 5:
1. Write two advantages of data modelling.

2. Virtual reality and Augmented reality simulations has many uses in the society now a days, write
two benefits of using them.

3. TRUE/ FALSE. In a database, Primary key field must be unique

10
4. TRUE/ FALSE. One benefit of using database is data sharing.

5. Describe the roles of each validation check.


Type check | Format check| Range check | Length check | Presence check

Validation check Description


It ensures that an important data item is not left blank.

It ensures that a data item has the correct number of characters.

It ensures that data is within an upper and a lower limit.

It ensures that data matches a fixed pattern.

It ensures that data matches the data type assigned to a particular


field.

6. Write two main features of a Database. Encircle and choose the two main features of a
Database from the list below.

 It is related.
 The data can not be duplicate in a database.
 Data can not be altered.
 It is well organized.

7.

Number of fields: ...................

11
Number of records: .................

Number of data items: ...........

8. Match the keywords with their definations.

a. Validation rule b. Validation text c Conditions

______________ A rule that specifies the characteristics of a valid data item.

______________ Text displayed to aid the user when they make an error entering data.

______________ A set of rules used to test data during the process of validation.

09. A librarian has designed the following database to record details about. Use what you
have learned about getting the data structure right to restructure the database for the librarian
by completing the data type for the list of fields below:

hints: Short text , long text, currency, data and time, number, boolean, memo

Member ID
Name
Address
Date Joined
Membership fees

10. Lenin is creating a database to track students information.

State FOUR fields with data type that Lenin may have in the database.
Field 1: .......................................................................................
Field 2: .......................................................................................
Field 3: .......................................................................................
Field 4: .......................................................................................

Unit 6:

1. Tick whether each description is the 'waterfall' or 'iterative' process.

12
Description Waterfall Iterative
model process

More time is spent on the planning stage before moving to


implementation

The project is developed throughout the process

The project starts and moves down to the next step as


each individual step is completed

The client is involved in each stage to help to refine and


develop the product

The client delivers the project details and then sees the
final product at the end

The project is split into smaller sections and the sections


are looked at in order of priority

2. Look at the pseudocode below , What would be the output if the


number guessed and input was each of the following?
START
setNumber = 50
number = INPUT a guessed number
IF number greater than setNumber THEN
OUTPUT "Lower"
ELSEIF number less than setNumber THEN
OUTPUT "Higher"
ELSE
OUTPUT "You guessed"
ENDIF
STOP

a 25 ______________

b 60 ______________

c 100 ______________

13
d 45 ______________

e 49 ______________

f 51 ______________

g 50 ______________

3. Make a list of the main characteristics of pseudocode.


_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________

4. Copy each example below into the correct section of the table for its data
type.

75 0.5 HI 123_21 Welcome YES 1

123abc 222 FALSE 5.69 NO TRUE 1.01

Data Example
type

String

Integer

14
Real

Boolean

5. Look at the pseudocode below.


START
money = 20.00
spent = INPUT "How much did you spend?"
moneyLeft = money - spent
IF moneyLeft >= 10 THEN
OUTPUT "Keep shopping, you have $", moneyLeft, "left"
ELSEIF moneyLeft >= 0 AND moneyLeft < 10 THEN
OUTPUT "Be careful spending, you have $", moneyLeft, "left"
ELSE
OUTPUT "Money all gone"
ENDIF
STOP

What will be the output for the following amounts of money spent?
a 5.50
_______________________________________________________
b 1.10
_______________________________________________________
c 6.70
_______________________________________________________
d 19.20
_______________________________________________________
e 15.30
_______________________________________________________

15

You might also like