0% found this document useful (0 votes)
9 views10 pages

Class 8th CS Notes

Class 8th notes of computer

Uploaded by

hamidullahokz620
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views10 pages

Class 8th CS Notes

Class 8th notes of computer

Uploaded by

hamidullahokz620
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Computer Science Class 8th

Unit # 01

1. Differentaite between LAN and WAN.


Ans.

LAN (Local Area Network) WAN (Wide Area Network

WAN is used to connect computers anywhere in the


A LAN connect computers at one place
world.

LAN cover limited area WAN can cover large area

Communication speed on LAN is fast Communication Speed on WAN is slow.

LAN is inexpensive (cheaper) WAN is expensive.

Transmission error on LAN is few Transmission error on WAN is more.

LAN have their own devices, like Hub,


WAN have their own devices like Router.
Repeater, Switch etc
WAN connects computers across large distance at
LAN Connects computers at a single site
multiple sites.

LAN is usually connected through wires WAN is usually connected through telephone lines

2. What are the benefits of using networks?


Ans. Following are the benefits of networks.
i. Communication
ii. Information Sharing
iii. Global Connectivity
iv. Resource Sharing
v. Remote Work
vi. Security

3. What is the role of network switch?


Ans. A switch is a communication device use for facilitating communication and data transfer in local area
network. Here are the primary roles of network switch.
i. Packet switching
ii. Device connectivity
iii. Broadcast control

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 1 of 10


Computer Science Class 8th

4. Differentiate between wired and wireless network.


Ans.

Wired Network Wireless Network

Uses physical cable to connect devices Uses signals to connect devices

Fixed Mobile

Faster Slower

Limited by cable length Rang can be extended

5. List different tasks that can be performed by robots.


Ans. A robot is a programmable device use to complete different tasks. It is widely used in automobile
manufacturing, packaging, laboratory research and cleaning homes.
6. Why distributed applications are used?
Ans. Distributed applications are used when workload is too much for a single server to handle. Some
examples of distributed applications are cellular networks, online banking, social networks and
supermarket check-out systems, etc.

7. What is the purpose of blockchain technology?


Ans. The purpose of blockchain technology is to provide a decentralized, secure, transparent and efficient
way to record and verify transaction and data.

8. Describe 3D holographic imaging.


Ans. 3D holographic imaging is a new technology that uses laser beams to create three-dimensional images
called holograms. A 3D hologram displays objects and animations that seem to be real.

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 2 of 10


Computer Science Class 8th

Unit # 02

1. Write down the uses of Microsoft Excel.


Ans. Excel is typically used to organize data and perform financial analysis. It is used across all business
functions and at companies from small to large. The main uses of Excel include:
 Data entry
 Data management
 Accounting
 Financial analysis
 Charting and graphing
 Almost anything, that needs to be organized.

2. What is the purpose of formula bar?


Ans. Formula Bar is used to enter data or formula into a cell. It can also be used to perform most
calculations that you can do on a calculator.
3. Differentiate between worksheet & workbook.
Ans. Worksheet: Worksheet is a collection of cells organized in rows and columns.
Workbook: Workbook is collection of one or more worksheets in a single file.

4. What are the steps to create a pie chart?


Ans. Following are the steps to create a pie chart
i. Select the cells that contain data to be used in the chart
ii. Click the Pie Chart button from the Insert tab

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 3 of 10


Computer Science Class 8th

Unit # 03

1. Explain the features of information processing model.


Ans. The information processing model is a cognitive framework used to understand how the human
perceive, process, store, and retrieve information. Some features of information processing model are
given below.
 Encoding
 Attention
 Perception
 Short-Term Memory
 Long-Term Memory
 Retrieval

2. Demonstrate the main steps in writing a pseudocode.


Ans. Following are the main steps in writing a pseudocode.
i. Develop the solution logic in your mind by arranging the sequence of tasks.
ii. At the start of pseudocode clearly write a statement showing main goal of a pseudocode.
iii. Now write the algorithm by defining sequences, repetitions or conditional statements as
required by the solution.

3. How nested loops are useful in arranging a calendar?


Ans. A nested loop is a loop that appears inside the other loop. Nested loops are useful when an iterative
task is to be done for multiple times. Nested loop is useful in arranging the calendar as calendar has
12 months and each month has 30 days. The outer loop of nested loop will arrange the months and
inner loop will arrange the days of a particular month. Its mean that for each iteration of outer loop
which arrange the months, the inner loop will be repeat 30 times to arrange the days for each month.

4. Differentiate between scope and limitations of a problem.


Ans. Scope: The scope of a problem defines the boundaries of what a solution must provide to meet the
requirements.
Limitation: The limitation of a problem refers to the aspects that are beyond the implementation of
the problem.
For example, if the problem is to design a calculator with basic arithmetic operations then its scope
is to have just four functionalities (Addition, Subtraction, Multiplication and Division). Any other
operations are its limitations.

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 4 of 10


Computer Science Class 8th

Unit # 04

1. For the following code block a sprite will turn to 30 degrees. How many clicks are required for
sprite to complete a full cycle?

Ans. 12 clicks are required for a sprite to complete a full cycle.

2. What is the difference in outputs of the following code-block, having 4 backdrops?

Ans. When the flag is clicked, the code will place the sprite at the coordinate (0,0) of the stage and perform
the following actions forever:
i. For the first code-block the backdrop will switch to next backdrops and wait for 0.5 seconds.
This step will be repeatedly performed for 4 times on each iteration of forever loop and the
sprite will move 10 steps normally.
ii. For the second code-block the backdrop will switch to next backdrops and the sprite will move
10 steps and wait for 0.5 seconds. This step will be repeatedly performed for 4 times on each
iteration of forever loop.
Note: The spirit will move faster in the second code-block than in the first.

3. For the maze game, duplicate the map ‘maze map and rename it as ‘maze Map 2. Next change
the color of lines in the new map form blue to red. Add Script such that the game becomes a
multi-level game with the 2 distinct image.
Ans. For additional levels we can simply choose the maze-map sprit and duplicate It as a new costume and
rename it. Thereafter we can rearrange or change the existing lines and draw new ones to add difficult

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 5 of 10


Computer Science Class 8th

levels. This way new maze design is created. Additionally, you can download maze images form
www.Inventwitchscratch.com/downloads and load these images as new sprites as well. To provide a
better understanding, let’s use such a maze-images for our next level.
 As a first step, we download our maze background and load these images as another Costume to our
‘maze-map’ sprite.
 Next adjust the position of this images such that starting point of both the maze images turn out to
be same this way for each level the starting position of ‘Pico’ will be same and no additional cods
will be required.
 Before proceeding further, we need to ensure first that the movement of ‘Pico’ spirit. On the new
map with arrow-keys is working and does not cross through the lines of the maze. Since, the color
of lines in both the maps is same; there the code will work in new map now, if not then it means
colors in both the maps are different. Now set the maps color to be the same.
 Now load the new map in the game. for this purpose, when the Pico touches the end mark in a level,
the next maze map sends a broad cast message,

4. Take a 4-digit number as input for a year and check if the year is a leaf year or not. Display
your output as: “the year 1979 in not a leaf year” or “the year 2020 is a leaf year”
Ans.
i. year = int(input(“Enter the year”))
ii. if (Year % 4 == 0):
iii. print (“ The year “, Year, “ is a LEAP year”)
iv. else:
v. print (“The year “, Year, “ is not a LEAP year”)

5. Take length and width as input form the user for a quadrilateral and check if it is a square or
rectangle.
Ans.
i. Length = int (input (“Enter the length of quadrilateral”))
ii. Width = int (input (“Enter the width of quadrilateral”))
iii. if (Length = = Width):
iv. print (“The Quadrilateral is Square”)
v. else:
vi. print (“The Quadrilateral is Rectangle”)

6. Write a program in Python for the following output (Print a triangle).

Ans.
i. For i in range (5):
ii. for space in range (5-i) :

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 6 of 10


Computer Science Class 8th

iii. print (end = " ")


iv. for j in range (i+1):
v. print (" * " , end = " ")
vi. print ( )

7. Write a program in python which displays square of the numbers and prints in the form of a
triangle, as shown below:

Ans.

i. num = 1
ii. For i in range (4):
iii. for space in range ( 4-i ):
iv. print (end = " ")
v. for j in range (i+1):
vi. print (num * num, end = " ")
vii. num = num + 1
viii. print ( )

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 7 of 10


Computer Science Class 8th

Unit # 05
1. Who is cyber scout? How can he/she assist in prevention of cyber-crime?
Ans. Cyber scout is a person who promote awareness about cybercrime in the society. He/she is trained to
identify cybercrime activity and has preventive knowledge to help fight against cybercrime. He/she
works to promote Cyber safety in his surrounding environment.

2. why we need cybercrime laws?


Ans. We need cybercrime laws because:
i. It protects or prevents ICT users to harm people, data, systems, services and infrastructure.
ii. It protects human rights.
iii. It enables the investigation and prosecution of crimes committed online.

3. Why computer systems should be protected from unauthorized access?


Ans. Computer systems should be protected from unauthorized access so that personal and secret
information does not get stolen or leak.

4. How creator of copyright work financially benefits from it?


Ans. Copyright gives economics rights to the creators to charge a fee for the reproduction of their work.

5. Why digital piracy is a crime?


Ans. Digital piracy means illegally copying digital content in any form without the consent of the owner.
Digital piracy is a crime as it is violation of owner's copyright.

6. Why hackers break into computer systems?


Ans. Hackers break into computer systems to stealing and changing information or to get credit card or
bank account details for financial benefits.

7. How spyware can be harmful?


Ans. Spyware is a type of malicious software (malware) designed to secretly monitor and gather information
from a computer or device without the user's consent. It can be incredibly harmful for several reasons:
i. Privacy Invasion
ii. Data Theft
iii. Surveillance
iv. System Instability
v. Unauthorized Access

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 8 of 10


Computer Science Class 8th

Unit # 06
1. Describe the basic components of business plan.
Ans. Following are the basic components of business plan.
i. Customer Needs: It is the process of identifying the requirements of the customers about the
product or service.
ii. Product Design: It is the process that involves steps to launch a successful product based on
customers’ requirements.
iii. Costing: In this step the estimated cost for setting up new business like legal cost, attorney fees
and licensed fees etc are planned.
iv. Operations: The operation includes objectives, goals, procedures and timeline of your
organization.
v. Marking: It is the action of promoting and selling the products and services.

2. Describe four elements of marketing.


Ans. The following are the four elements of marketing:
i. Product: Product (goods or services) is the main entity which your business offers to the end
user.
ii. Price: Price is the amount of money, customers have to pay to get the product.
iii. Place: Place is the location where your product or service should available. This could involve
choosing the right sales channels or physical distribution locations.
iv. Promotion: This is the methods and tactics you use to make your target audience aware of your
product or service. This includes advertising, public relations, content marketing, social media
etc.

3. What is the difference between payment and Transaction?


Ans. Payment: It is the transfer of money against the purchase of goods or services
Transaction: It is an agreement between a buyer and seller to exchange goods, services or financial
assists in return for money.

4. Why a quality assurance is important to assess the quality of a product or service.


Ans. Quality assurance helps a company create products and services that meet the needs, expectations and
requirements of customers. It yields high-quality product offerings that build trust and loyalty with
customers.

5. Write down three advantages and three disadvantages of Digital marketing.


Ans. Advantages of Digital marketing:
i. Removed all sorts of geographical barriers.
ii. Have extremely low risk.
iii. Faster response to both marketers and the end users.
Disadvantages of Digital marketing:
i. Fully dependent on technology.
ii. Security and privacy issues may arise.
iii. Worldwide competition through globalization.

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 9 of 10


Computer Science Class 8th

Prepared by SHAKIR ISHAQ CT-IT @GHS Jalala 03459270285 Page 10 of 10

You might also like