0% found this document useful (0 votes)
22 views

Revision paper Theory

Fill it in to live or else

Uploaded by

saima.fakhar1985
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Revision paper Theory

Fill it in to live or else

Uploaded by

saima.fakhar1985
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

[Type here]

BRITISH INTERNATIONAL SCHOOL, AJMAN


REVISION PAPER- FIRST TERM
2024-2025
CANDIDATE NAME: ____________________________
SUBJECT: ICT THEORY GRADE & SECTION: 7_____
Topic: The Nature of Technology, Digital data, Conversion of decimal numbers into binary, Digital text and
numbers, staying safe online, Collecting data online, Cookies and its types, Malware, Online danger, MS Access,
Robots.
Learning objective: to assess the student’s understanding of the given topics

The Nature of Technology

1. Explain how data is stored in the computer memory [1]

2. Write how many digits we use in binary number system also write its base? [1]

3. Give two examples of a binary value from everyday life? [1]

Digital text and numbers

4. Explain how numbers and text are stored as digital data [2]

5. Define ASCII code.


[Type here]

Conversion of decimal numbers into binary

1.Convert the following into binary to decimal. [2]


a. 011001100 b. 10000111

2.Convert the following into decimal to binary. [2]


a. 49 b. 97
[Type here]
Staying safe online

1. Why is it important to think before you post something online? [1]

2. What should you do if you see something suspicious online? [1]

Cookies and its types

1. Define the following. [4]

Cookies:

Web scraping:

Session Cookies:

Persistent Cookies:

Malware, Online danger

1. Give the reasons of spreading malware [3]


[Type here]
2. Define malware and explain why it poses a threat to digital safety in a school environment. [3]

3. Explain the difference between a virus, a worm, and a Trojan horse. [3]

virus worm Trojan horse

MS Access

1. Define database and its key components. [2]

2. Write the correct data type of the following fields. [5]

Field Name Data Type


[Type here]
Student ID

First Name

Last Name

Date Of Birth

Gender

Grade

Phone Number

Email Address

Enrollment Date

Is Active

Robots

1. Write down advantages and disadvantages of robots. [2]

2. Explain the control system of robots. [2]


[Type here]

You might also like