SLO Base Questions With Their Solution.
SLO Base Questions With Their Solution.
Objective Part
4. The code blocks in scratch, that have a notch on the top and bump on the
bottom are called stack blocks
Subjective Part
Programming construct are basic building blocks that can be used to control computer
program. There are five main programming constructs
Loops are used within codes used to repeat an action multiple times. In the Control section of
block code. There are three types of loops.
If else block
In Scratch, the If-Else block is used to perform the operations only if the specified condition is
true. For instance, if the user types "a", then the sprite must glide for 1 second.
If then else
If the user types "a", then the sprite must glide for 1 second, else the sprite must say "hello".
2
The If-Then statement is the simplest conditional statement in Small Basic. Its syntax is: If
(condition) Then (Statements to be executed if the condition is true)
Variable: Variables in programming terminology serve as a container that can store some
value. The most common use is to store values. Variables are of immense help to the
programmers
Q6:In case you wish to make your own variable, with a different name, write steps to
create new variable.
1st click on “Make a Variable” button in the variable palette, then a form will appear on the
screen.
Bug Debugging
Bugs are errors or mistakes in writing a Debugging is the process to remove errors
program. so that the program runs smoothly. The
Sometimes, more bugs are introduced first step to debug a problem is to analyse
while fixing a bug. This is because when each step and apply logical reasoning.
programmer rewrites the code, new errors
could occur.
3
Q9: Why conditional statements are used in scratch?
Conditions are a key part of the decision-making process for computers. When the program
has to choose between two or more courses of actions, the conditional statements are used.
The conditions control the programs flow based on the true or false value of the condition.
They are found in the control programming blocks.
4
c. Phishing
d. Copyright
4. The authorized access to one’s personal information and using it without
consent is called:
a. Misinformation
b. Online scams
c. Privacy invasion
d. Both a and c
5. Which of the following gives the users a chance to try the software before buying
it
a. Freeware
b. Shareware
c. Pirated software
d. None of the above
6. RSI stands for:
a. Repetitive strain injury
b. Wrist strain injury
c. Repetitive sensitive injury
d. None of them
7. Which of the following is a good example of a strong password
a. 1234
b. 123A@4!
c. 123
d. 4321
Q: Fill in the Blanks:
1. Staying safe online when using the internet is called Cyber security or Online
safety.
6. Using some one’s else work without giving due credit is called Plagiarism
Subjective Part
5
Q1: Ali has to submit a report on Global Warming and its Effects in the coming week.
He asked his father to review it. After reviewing, his father after reviewing it told him
that there port is 30% plagiarized. What do you understand by this? Suggest any one
way that Ali can use to counter this.
Plagiarism means using someone else's work (ideas, writing, images, etc.) and presenting it
as your own without giving proper credit to the original source.
In Ali's case, 30% plagiarism indicates that a significant portion of his report contains copied
material from other sources without proper citations. This is a serious academic offense and
can have consequences.
One way for Ali to counter this: Thorough Paraphrasing:* Instead of directly copying
sentences, Ali should paraphrase the information he gathered from different sources. This
means rephrasing the ideas in his own words while still acknowledging the original source.
Q2: You have studied ICT rules in the lesson. Your ICT teacher must have also set
certain rules. Why do you think these rules are important? Is there any specific rule
that you would like to add or amend?
* ICT rules are important because: They promote responsible and ethical use of technology.
They ensure a safe and respectful learning environment for all students. They protect
students from cyberbullying, online harassment, and other online dangers. They help students
develop good digital citizenship habits.
A specific rule I would like to add or amend: "Respect for Online Privacy": I would emphasize
the importance of respecting the privacy of others online. This would include rules against
sharing personal information of others without their consent, spreading rumors or gossip
online, and using technology to invade the privacy of others.
The ability to safely and responsibly access the digital technologies is called digital
citizenship. It encompasses digital literacy, ethics, etiquettes, online safety, safe and
responsible technological use, awareness of rights of self and others, etc.
Digital footprint means the trail of data you create while using the Internet. This includes your
search history (including incognito mode), emails, text messages (including deleted
messages), downloads, tagged photos, likes and comments on social media, sharing of news
article, online purchases, etc.
Digital literacy refers to the skills required to learn and live in a society where digital
technologies are increasingly playing a role in communication and providing access to
information.
Communication skills are an important aspect of digital literacy. One should be able to
articulate their thoughts, opinions clearly and respectfully. It is important to follow the same
standards of communication as followed in a civilised society.
While drafting emails, text messages, commenting, etc. one should have a respectful tone.
Accessing, managing, and analysing information are also critical skills of digital literacy.
Q7: Explain copyrights. And what is the symbol for copy right
Copyright is a law that protects the work of authors, artists, composers. Etc. from being used
or copied without permission. Copyright is the protection of a body of work that prevents it
from being used without prior authorization.
Identity theft is the unauthorized use of someone's personal information, such as their name,
Social Security number, credit card details, or other identifying information, to commit fraud or
other crimes.
7
c. Entrepreneurship
d. Both b and c
2. A business related to clothing, restaurants, and convenience is called as
a. Retail business
b. Manufacturing and production
c. Health care
d. Service-based business
3. A flower shop is best categorized as
a. Small-scale business
b. Scalable entrepreneurship
c. Social entrepreneurship
d. All of the above
4. Your friend owns a YouTube channel. He creates
tutorial/explainer videos on baking. How would you categorize
their business?
a. Small-scale business
b. Retail business
c. Digital business
d. Both a and c
5. Selling products online using any website is called:
a. E-commerce
b. Retail business
c. Health and safety
d. All of them
6. Using surveys and interviews together information about the problem is called:
a. Planning
b. Idea generation
c. Growth
d. Opportunity evaluation
Fill in the blanks
1. A business initiated with the intent of expanding operations after a certain period
is called startup
2. Creating a business on the internet is called E. Commerce
Subjective Part
11