0% found this document useful (0 votes)
17 views

MS TH SMP2

Uploaded by

ejaman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

MS TH SMP2

Uploaded by

ejaman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

UNIVERSAL SCHOOL

MID TERM ASSESSMENT (AUGUST) – 2023 – MARKING SCHEME


NAME: ______________________ DATE: 22nd AUG - 2023
GRADE: _SMP2___________ MARKS: 45
DURATION: 60 MINUTES

READ THESE INSTRUCTIONS CAREFULLY BEFORE ANSWERING:


➢ Read and follow the given directions, otherwise marks will be deducted from your score.
➢ Answer all questions.
➢ Write neatly using either a BLACK or BLUE INK PEN.
➢ The use of TIPEX and other forms of correction tape / fluid is NOT ALLOWED.
➢ Check your answers well before you submit the paper.
➢ This question paper consists of THREE [3] printed pages.

PART 1: ANSWER THE FOLLOWING QUESTION IN FOLIO PAPER.


I. Multiple Choice Questions: [1X5=5M]

1. ________ is the smallest type of network.


i. Campus Area Network
ii. Bluetooth Area Network
iii. Personal Area Network
iv. Metropolitan Area Network

2. Set of instructions that tell a computer what to do to complete a task is called a ________
i. Software
ii. Instruction
iii. RAM
iv. CPU

3. Physical parts of a computer that you can touch and see are called ________
i. Wide Area Network
ii. Personal Area Network
iii. Metropolitan Area Network
iv. Hardware

Page 1 of 5
4. While working with numbers in Python the ______ keyword needs to be used
i. Input
ii. Int
iii. Integer
iv. Number

5. Python is a/an _____________ language.


i. Compiled
ii. Interpreted
iii. Scripting
iv. Markup

II. State whether the following statements are True or False (T/F). [1X5=5M]

1. A Switch is smarter than a HUB. TRUE

2. A copper wire is also known as ethernet cable. TRUE

3. An ethernet cable has a higher bandwidth compared to fibre optics cable. FALSE

4. Fibre optics cable uses light to transmit data. TRUE

5. In Python, single and double quotations can be used interchangeably. TRUE

Part 2
III. A company named TAWARA INDUSTRIES wants to set up a working environment in their
newly opened office in Jakarta. You, being the Network Administrator for the company, has
been given this responsibility.

a. Which type of network (write in full) would you chose to set up all the devices in one
floor of the main building of TAWARA INDUSTRIES? Justify your answer. [1]
- Local Area Network
- Justification: Area spans over one floor of one building – The devices
need to be connected to each other and not to the internet. – These are
the perfect conditions for a LAN.

b. Name any two hardware components that would be required for you to setup this
network. [2]
- Switch
- Ethernet Cable [2]

c. Mention one device that you would use to connect this network to the World Wide
Web. [1]
- Router
Page 2 of 5
d. Installing a server is a good idea in this type of network. Name any two types of
server. [2]
- Any from: Mail Server, Web Server, File Server or Printer Server.

e. Name the type of Operating System that the server of the network is going to have. [1]
- Network Operating System

IV. Distinguish between the following: [2x5 = 10]


a. WWAN & WLAN
- WWAN: large geographic area; enables internet access to devices; uses
cellular technology;

- WLAN: limited area; does not enable internet access; uses Wi-Fi and may
require WAPs.
b. Copper wire and Fibre optic cable
- Copper wire: transmits data as electrical pulses; Bandwidth is around
10Gb per second; Inexpensive.
- Fibre optic: transmits data as pulses of light; Bandwidth is around 100 Tb
per second; Expensive.
c. Compiler and Interpreter
- Compiler: Translates high level language to machine language in the
program’s entirety; Does not stop the execution of the program if an error
is found; Gives a summary of all the errors at the end of the execution of
the program.
- Interpreter: Translates high level language to machine language one line
at a time; Stops the execution of the program if an error is found; Displays
the error as soon as it is found.

d. Command Line Interface and Graphical User Interface


- CLI: Does not have windows, icons, menus and pointing devices; Direct
communication with the computer system; Restrictions such making
changes to the system configuration are not imposed.
- GUI: Does have windows, icons, menus and pointing devices; Is not in
direct communication with the computer system; Restrictions such making
changes to the system configuration are imposed.

e. Serial and Parallel transmission


- Serial: Sends data bit by bit; Slower; Sequential; Longer distances
- Parallel: Multiple bits; Faster; Simultaneous; Shorter distances

Page 3 of 5
V. Answer the following:
a. What are comments in Python? [2]
- In Python, comments are text annotations within the code that are not
executed as part of the program. They are used to provide explanations,
notes, or documentation to make the code more understandable to
humans, including other programmers who might read or work on the
code. Comments are ignored by the Python interpreter and have no
impact on the execution of the program

b. What do you understand by “Python is a loosely typed language”? Explain with an


example. [3]
i. "Python is a loosely typed language" means that in Python, you don't need to
explicitly declare the data type of a variable before using it. The interpreter
determines the data type based on the value assigned to the variable. This
flexibility allows you to change the data type of a variable during runtime.
ii. E.g., #This is an example of a single line comment
x=5 # x is an integer
iii. x = "hello" # x is now a string
iv. x = 3.14 # x is now a float
‘’’ This is an
example of
a multiple lines
comment ‘’’

c. Describe how an antivirus software functions. [3]


- Antivirus software functions by detecting, preventing, and removing malicious
software (malware) from a computer system. It does this through a combination
of signature-based and behavior-based methods. Signature-based detection
involves comparing files and programs against a database of known malware
signatures. Behavior-based detection monitors system behavior for unusual or
suspicious activities that might indicate malware. When a threat is identified, the
antivirus software quarantines or deletes the malicious files, neutralizing the
threat.

VI. As the Network Administrator of TAWARA INDUSTRIES, you have been given the
responsibility of the security and safety of the firm.

a. Define malware? [2]


- A software that has been developed for malicious purposes is known
as a malware. For example, Virus, Trojan, Ransomware etc.

b. Mention two types of malwares that can be found in computer systems. [2]
- Virus, Trojan, Ransomware etc

Page 4 of 5
c. Explain the any two types of malwares. [4]
- Virus: Attaches itself to some other system file. Enters the destination
system without authorization. Harms the computer system depending
upon its purpose.
- Trojan: Hides itself or disguises itself to be a part of the system. It seems
so unharmful and may not get detected by the antivirus system. Such files
does not start causing harm as soon as it enters a system, instead waits
for a perfect time to start causing harm to the system.

Page 5 of 5

You might also like