Podcast
Questions and Answers
Which of the following is not a programming language?
Which of the following is not a programming language?
What is the symbol for output in a flowchart?
What is the symbol for output in a flowchart?
Identify the 'move' tool in GIMP.
Identify the 'move' tool in GIMP.
What is a pseudocode?
What is a pseudocode?
Signup and view all the answers
Which device facilitates the computer to work with audio?
Which device facilitates the computer to work with audio?
Signup and view all the answers
The main permanent storage device of a computer is
The main permanent storage device of a computer is
Signup and view all the answers
Which statement describes RAM correctly?
Which statement describes RAM correctly?
Signup and view all the answers
This picture shows a
This picture shows a
Signup and view all the answers
Which device uses a read/write head?
Which device uses a read/write head?
Signup and view all the answers
DDoS attacks may use a botnet to overwhelm a server or other network resource with fraudulent traffic, thus triggering the system to deny access to legitimate users.
DDoS attacks may use a botnet to overwhelm a server or other network resource with fraudulent traffic, thus triggering the system to deny access to legitimate users.
Signup and view all the answers
Phishing attack is sending someone a text message containing a malicious software to encrypt personal data.
Phishing attack is sending someone a text message containing a malicious software to encrypt personal data.
Signup and view all the answers
A rootkit is a set of malicious applications, which allows an enemy to get hold of the administrative access to a computer system.
A rootkit is a set of malicious applications, which allows an enemy to get hold of the administrative access to a computer system.
Signup and view all the answers
Hacking is always an illegal activity.
Hacking is always an illegal activity.
Signup and view all the answers
Backing up is not a security measure that could safeguard data from most threats.
Backing up is not a security measure that could safeguard data from most threats.
Signup and view all the answers
Complete the key: Hackers ________.
Complete the key: Hackers ________.
Signup and view all the answers
Write three types of filters available in Open Office Calc.
Write three types of filters available in Open Office Calc.
Signup and view all the answers
Match the following items:
Match the following items:
Signup and view all the answers
Study Notes
Computer Science
- A programming language is not Photoshop, which is a graphics editor.
Flowcharts
- A parallelogram symbolizes output in a flowchart.
- A rhombus symbolizes a process in a flowchart.
GIMP
- The 'move' tool in GIMP is represented by an arrow icon.
Pseudocode
- Pseudocode is a way of describing a set of instructions in text form, used to plan out a program.
Computer Hardware
- A sound card facilitates the computer to work with audio.
- The main permanent storage device of a computer is the hard drive.
- RAM (Random Access Memory) is a type of memory that contains data and instructions which are currently needed by the processor.
- A hard drive uses a read/write head.
Computer Security
- DDoS attacks use a botnet to overwhelm a server or other network resource with fraudulent traffic.
- Phishing attacks do not involve sending someone a text message containing malicious software to encrypt personal data.
- A rootkit is a set of malicious applications that allow an attacker to gain administrative access to a computer system.
- Hacking is not always an illegal activity.
- Backing up is a security measure that can safeguard data from most threats.
Open Office Calc
- Three types of filters available in Open Office Calc are:
- AutoFilter
- Standard Filter
- Advanced Filter
Animation Effects
- The animation effect that moves an object within the slide in a given route is a motion path.
Flowchart for Bonus Calculation
- The flowchart for bonus calculation based on employee score, category, performance, and years of experience is as follows:
- Start
- Output "Enter the score"
- Is score 80 or above?
- Yes: Output "Bonus = 3 salaries"
- No: Is score 65-79?
- Yes: Output "Bonus = 2 salaries"
- No: Is score 50-64?
- Yes: Output "Bonus = 1 salary"
- No: Output "No Bonus"
Pseudocode for Bonus Calculation
- The pseudocode for bonus calculation based on employee score, category, performance, and years of experience is as follows:
- Input score
- If score >= 80 then
- Output "Bonus = 3 salaries"
- ElseIf score >= 65 and score < 80 then
- Output "Bonus = 2 salaries"
- ElseIf score >= 50 and score < 65 then
- Output "Bonus = 1 salary"
- Else
- Output "No Bonus"
Python Programming
- The output of the Python code
X = 25; Y = 10; results = X - Y; print("X - Y =", results)
isX - Y = 15
.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This is a computer science examination paper for 8th class students, conducted in July 2023. The exam consists of 2 periods and has a total of 100 marks.