0% found this document useful (0 votes)
2 views

G8 Computing End Term Revision Toolkit

The document is a revision toolkit for Grade 8 Computing at Delhi Public School, covering key concepts, terminology, and important notes for various chapters. It includes guidance on assessment preparation, emphasizing the need for additional resources beyond the toolkit. The content spans topics such as network structures, pseudocode, operating systems, programming, and data validation.

Uploaded by

inapanurivrinda
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

G8 Computing End Term Revision Toolkit

The document is a revision toolkit for Grade 8 Computing at Delhi Public School, covering key concepts, terminology, and important notes for various chapters. It includes guidance on assessment preparation, emphasizing the need for additional resources beyond the toolkit. The content spans topics such as network structures, pseudocode, operating systems, programming, and data validation.

Uploaded by

inapanurivrinda
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

DELHI PUBLIC SCHOOL

Nacharam
Cambridge International Education
AY 2024 - 2025
Revision Toolkit
Computing Subject Code: 0860
Assessment Cycle: End Term
Candidate Name: Grade:8 Section:

Centre Number: I N 1 7 4 Candidate Number:

_________________________________________________________________________________________________

READ THESE INSTRUCTIONS FIRST


The Revision toolkit is a guide to prepare the candidates for the assessment cycle.
It is a comprehensive document that provides concept-based content, paper pattern, sample question papers, audio video
links and other materials that will help the candidate to prepare for the assessments.
Readiness for assessment is not limited to the revision toolkit only. Candidates must refer to the textbook, workbook,
previous worksheets, notebook and all teaching learning materials for the syllabus outlined for the assessment.
Candidates must approach their respective subject mentors in case of doubts or guidance needed to prepare well for the
assessment.

This document consists of 27 printed pages [Turn Over]

1
Chapters Wise Key Concepts

Sl. No. Chapter Key Concepts

1 CH-1 Building  Identify the different types of network, such as PAN,


Networks: Network LAN and WAN
Structure and  Advantages and disadvantages of wired and wireless
Security networks.
 Data transmission and echo checks
 Roles of firewalls, anti-virus and anti-spyware in
network security.
 Operating System-its purpose and utilities

2 CH-2 Pseudocode  Identify the important characteristics of pseudocode,


and Algorithms including that it should be short, clear and precise
and should have the start and end clearly shown.
 Follow pseudocode algorithms that use conditional
statements.
 Predict the outcome of algorithms and test that they
meet those outcomes.
 Know how to decompose problems into their sub-
problems.
 Explain the need for searching algorithms.
 Describe and use linear searches.

3 CH-3 Let’s talk  Purpose of operating systems and utility programs.


technology: What’s  ASCII Encoding.
going on inside  Converting denary to binary and vice versa.
 Understand the importance of compression.
 Complete truth tables for AND, OR, NOT gates.
 Understand the roles of primary memory, RAM, and
ROM.
 Machine Learning
 Identify the use of augmented reality in familiar
contexts, including education and entertainment

2
4 Programming  Outline the purpose of program libraries.

 Identify and know how to use library functions in text-


based programs.
 Know how to develop text-based programs with
conditional (selection) statements.
 Understand and use rules using AND, OR and NOT to
create logic within algorithms.
 Know how to develop text-based programs that use
rules involving AND, OR, and NOT.
 Identify and describe data types in text-based
programs, including Integer, Real, and Boolean.
 Know how to develop text-based programs using data
types, including Integer, Real, String, and Boolean.
 Use an iterative process to develop programs.
 Know how to test algorithms using suitable data.
 Explain the need for using a range of test data.
 Know how to develop and apply test plans.
5 CH-5 Data Input:  Identify key features of models such as simulators,
Data Collection and including their data requirements.
Validation  Know how to use spreadsheets that are models of
real-life systems, using what-if analysis to compare
alternative scenarios.
 Identify the data that are required for specific
applications.
 Evaluate the suitability of data that have been
collected for particular purposes.
 Design appropriate forms, including data validation, to
collect data for given purposes.
 Know how to add validation rules to a database
structure.
 Evaluate the suitability of pre-existing databases for
given purposes.

3
Chapters Wise Key Terminology

Sl. No. Chapter Terminology


1 CH-1 Building  binary (number)
Networks: Network  personal area network (PAN)
Structure and
 local area network (LAN)
Security
 wide area network (WAN)
 copper cable v/s fibre optic cable
 bandwidth
 switch / router / wireless access point
 echo check
 firewall
 virus / antivirus
 spyware / antispyware
2 CH-2 Pseudocode  algorithm
and Algorithms  flowchart
 pseudocode
 construct
 conditional statement
 searching algorithm
 linear search
 decomposition / decompose
 constant
3 CH-3 Let’s talk  operating system
technology: What’s  processor
going on inside  utility programs
 software
 ASCII
 decipher
 encode / encoded
 character set
 compression
 truth table
4 Programming  program library
 Boolean
 data type
 library function

4
 conditional statement
 selection statement
 Boolean operators
 iterative process
 indent / indentation
 flag
 testing / test plan
5 CH-5 Data Input:  database
Data Collection and  model
Validation  simulator
 data-capture forms
 data validation
 what-if

IMPORTANT NOTES

Sl. No. Chapter Notes

1 CH-1 What is a network?


Building Answer: a connection that allows two or more devices to
Networks: communicate
Network
Structure and What is a network used for?
Security Answer: to send data, including emails, files and websites

Compare PAN, LAN and WAN


PAN LAN WAN
PAN is a personal LAN is a local area WAN is a wide area
area network. This network. This is network. This is
is usually two multiple devices multiple devices
devices (or a small connected over a connected over a
number) in close small geographical large geographical
proximity area (usually area (usually
connected for a defined as a single defined as multiple
specific purpose, building or under a buildings). Some of
for example mile). The hardware the hardware is not
connecting a (infrastructure) is owned by the
mobile phone to a owned by the specific individual
television to view network owner so it or company, but
images, or does not use may instead be
connecting a external cabling or provided by a utility

5
laptop to a printer. internet. company. Examples
include a multi-
campus university,
local government,
or a nationwide
store.

Why could a wireless connection be better than a wired


connection?
Answer: more portable; users can add more devices easily

Why could a wired connection be better than a wireless


connection?
Answer: faster transmission; more secure; more reliable

Why is an echo check needed?


Answer: To check whether data has been transmitted correctly.

How does an echo check work?


Answer: The sender transmits the data. The receiver transmits the
received data back. The sender then compares both sets of data
to determine if they are the same.

What are the possible problems with an echo check?


Answer: The error may occur in the second transmission. This will
cause the data to be resent when it is not necessary to do so,
given that the initial transmission was correct. Resending the data
will slow down is receipt and could create bandwidth issues.

What can happen if someone gets access to your computer? What


can they do?
Answer: delete data, change data or install malware

What future problems may this cause?


Answer: loss of personal or important data

What can happen if a virus is installed on your computer? What


damage can it cause?
Answer: it can: delete data; fill the hard drive so there is no
memory space left; replicate itself and transmit itself to other
people’s computers

What can happen if spyware is installed on your computer? What


damage can it cause?
Answer: it can record your username and password and use them
to access your system in a different way; criminals can use
spyware to record bank details and steal money.

What is the purpose of a firewall?

6
Answer: to stop unauthorised access to a computer system

How does a firewall stop unauthorised access?


Answer: it scans incoming and outgoing signals and stops those
that are not authorised

What is the purpose of antivirus software?


Answer: to stop viruses

How does antivirus software stop viruses?


Answer: it scans files for viruses and deletes or quarantines any
that are found

What is the purpose of antispyware software?


Answer: to prevent spyware from gaining access to a device

How does antispyware stop spyware?


Answer: it scans files for spyware and deletes or quarantines it
2 CH-2 What is pseudocode?
Pseudocode Answer: A form of representing an algorithm without a set syntax.
and Algorithms
When is pseudocode used?
Answer: When planning or designing algorithms.

Why is pseudocode used?


Answer: It is language independent so anyone should be able to
understand it.

What features does pseudocode contain?


Answer: Command words, assignment symbols, mathematical
symbols.

What is selection?
Answer: Selection is an instruction within an algorithm
where a decision is made about whether to run a piece
of code or not.

What are the key words used in conditional statements


in programming?
Answer: IF, THEN, ELSE

What are the different symbols that can be used for


comparisons?
Answer: >, <, >=, <=, <> =

What is the format of a pseudocode conditional statement?


Answer: IF THEN ELSE, or if condition: else:
What are the three component parts of a conditional statement?
Answer: the condition; the code to run if true; the code to run if

7
not true

What is decomposition?
Answer: Splitting a problem into smaller problems.

What is a constant?
Answer: A space in memory that stores a value that cannot be
changed while the program is running.

Why do you use a constant instead of a variable?


Answer: To avoid accidental changes. To allow you to change the
value once so it updates it everywhere that it is used.

What is a searching algorithm?


Answer: a series of steps that looks for specific data in a set of
data

Why are searching algorithms needed?


Answer: to find data within a set of data

Give an example of a searching algorithm.


Answer: a linear search

How does a linear search work?


Answer: each item is checked in turn, starting with the first
3 CH-3 Let’s talk What is an operating system?
technology: Answer: software that allows the user to interact with the
What’s going on computer
inside
What is the purpose of an operating system?
Answer: to allow the user to interact with the computer without
needing to understand how it does it

Give some examples of what an operating system can do.


Answer: output an interface; manage the hardware and software

What is a utility program?


Answer: software that comes with the OS and performs
housekeeping tasks

What is the purpose of a utility program?


Answer: to perform maintenance and housekeeping tasks

Give examples of what utility programs can do.


Answer: delete malicious files, prevent unauthorized access, data
compression, disk defragmentation etc.

What is ASCII?
Answer: A set of codes to represent characters in a computer

8
How is each character stored in the computer?
Answer: As a unique binary number

How many bits does standard ASCII have per character?


Answer: 7

How does the number of bits affect the number of chara cters?
Answer: More bits allows for more characters

What is compression?
Answer: Reducing the file size of a file.

What are the two reasons why compression may be needed?


Answer: to take up less storage space; to increase the speed of
transferring a file

What are logic gates?


Answer: the building blocks of digital circuits that have one or two
inputs that can be turned on or off

What are the 3 different logic gates?


Answer: AND, OR, NOT

What does a processor do in a computer?


Answer: it takes instructions and executes them

What is memory in a computer?


Answer: hardware where data is stored temporarily or
permanently

What is the purpose of secondary memory?


Answer: to store data in the long term and to create additional
storage capacity

Where do you store data when you save it on a computer?


Answer: hard drive, solid state drive, memory stick

What is the purpose of RAM in a computer system?


Answer: Currently running programs and data

What will ROM typically store?


Answer: Start up instructions, part of the operating system, some
programs if a system that has limited function
.
What is machine learning?
Answer: when a program is able to automatically adapt its own
processes or data

Give an example of machine learning.


Answer: Recognising images or voices, or playing a game

9
What is a robot?
Answer: a machine that moves to mimic human actions

What is artificial intelligence?


Answer: a computer program that makes decisions to determine
its actions to simulate human behaviour

What is augmented reality?


Answer: A computer generated image superimposed on the real
world

Give an example of an augmented reality system.


Answer: An application that allows you to view an object from all
angles

How could augmented reality be used in education?


Answer: To view objects from different perspectives or objects
that couldn’t be ordinarily viewed within the local environment.

How could augmented reality be used in entertainment?


Answer: To add reality to computer games or to combine fantasy
and reality in films and advertising.

4 Programming What is the symbol for a condition in a flowchart?


Answer: a diamond

What is a data type in programming?


Answer: data that is put into categories, so the program knows
what is expected

What data types do you already know?


Answer: Integer, Real and String

What is the difference between an Integer and a Real number?


Answer: an Integer is a whole number, a Real number is a decimal
number

What is a string?
Answer: one or more characters that can include letters, symbols
and numbers that are not used in mathematics calculations, such
as telephone numbers or credit card numbers.

What is iterative development?


Answer: Repeatedly editing and testing a program until it is
complete.

How could iterative development be useful when you have a very


large program to write?
Answer: The program can be split it into smaller parts, with those

10
parts being worked on individually. New features and parts can
then be added to the program throughout the iterative process.
Why do we need to test programs?
Answer: to make sure that they work; to check there are no errors;
to check that they give suitable responses to unexpected input

How do we test that a program works?


Answer: we use the program, for example by entering data and
pressing buttons, then check whether it does what is expected to
meet its criteria.

Why did you test your program?


Answer: To make sure it works and to check whether it does what
is expected to meet its criteria. Testing also checks whether the
program is able to give a suitable response to an unexpected
input.

Why should you test a program using a range of data?


Answer: It may work with one input but not any other inputs.
Testing with a range of data also checks whether t he program
works in all reasonable cases.
5 CH-5 Data What is a model in data analysis?
Input: Data Answer: A model is a computer application that replicates a real-
Collection and life environment, where data can be changed to see what
Validation happens.

What is a spreadsheet?
Answer: A spreadsheet is a piece of software that allows the user
to enter and to present data and perform calculations.

How can we use a model to answer ‘what-if’ questions?


Answer: by changing values and looking at what else changes.

Why might we use a model for ‘what-if’ questions?


Answer: to see what will happen without actually having to
perform the action(s).

Why is it important that collected data is suitable for its purpose?


Answer: So that it is complete and contains everything that is
required. There is no excess data and the data is in an appropriate
format.

What can happen if the data is not complete?


Answer: It may not be able to be analysed fully and may not
therefore produce the required information.

What can happen if there is excess data?


Answer: It can take longer to process and uses more storage
space. Excess data can also be a distractor.

11
What can happen if data is not appropriate?
Answer: The application may not function or may not give
accurate results.

What are data capture forms?


Answer: paper-based or electronic documents that a user
completes with data

Why do we need data capture forms?


Answer: to collect data in a structured format

What are the features of a well-designed data capture form?


Answers will include: suitable layout; clear instructions;
appropriate format (colour, font); restricting response types

What is validation?
Answer: Checking that data is reasonable

Why is validation important?


Answer: To make sure inappropriate data is not entered.

When did you use validation, and why?


Answer: When data is being input or collected as part of a survey
where respondents are completing a form.

12
APPLICATION BASED WORKSHEETS SET-2

TOPIC: FLOWCHARTS

1. MOD operator gives the remainder and DIV operator give s the quotient,
For example: 7 MOD 3 = 1
7 DIV 3 = 2
Draw a flowchart for the following problem.

when a is divided by b.

Otherwise, display the product of a and b.

13
2. Draw a flowchart to display the first 10 multiples of an input number.

3. An algorithm is needed to process a sequence of numbers. Numbers may be positive or


negative and may be integer or decimal.
The algorithm will:
 prompt and input one number at a time until the value zero is input
 sum the negative numbers
 sum the positive numbers
 when zero is input, output the two sum values and then end
Draw a flowchart for the above algorithm.

14
TOPIC: TRACE TABLES
Instructions:
 Use the first line of trace tables for initial values
 Every INPUT/OUTPUT statement takes you to the next line/same line(if enough space is n ot
provided).
 You can never move up in a trace table.
 Suppose Computer = 10.
Few outputs are given below:
OUTPUT “Computer” Computer
OUTPUT Computer 10
OUTPUT “Computer”, Computer Computer 10

4. Consider the following flowchart:

15
5. The flowchart below inputs the height of children who want to ride on a rollercoaster.
Children under 1.2 metres are rejected. The ride starts when eight children have been
accepted.
(a) Fill in the empty boxes to complete the algorithm:

(b) How can this algorithm be modified to accept children having height in the range of 1.2
m (exclusive) and 1.5 m (inclusive)?

………………...................................................................................................................................

.........................................................................................................................................................

.........................................................................................................................................................

.........................................................................................................................................................

.........................................................................................................................................................

.........................................................................................................................................................

16
6. This flowchart inputs the points won and the points lost when playing a game. The
difference between the points won and lost is calculated and depending on the result the
player can: move up to the next level, stay at the same level, or move down to the previous
level. The flowchart finishes when the input for points won is –1.

17
TOPIC: TEST PLAN TABLES

l=[5,4,8,9,6] i l[i] sum Output


sum=0
for i in range(len(l)-1):
sum=sum+l[i]-i
print(sum)

count=1 i count Output


for i in range(1, 5):
count=count*i
print(count)

a=10 i a b
b=5
for i in range(0,4):
a=a+i
b=b-i
print("Final value of a:", a)
print("Final value of b:", b)

n=12; n sum Output


sum=0;
while(n>1):
sum=sum+n;
n=n//2
print(sum)
l=[5,4,8,9,6] i l[i] sum Output
sum=0
for i in range(1, len(l)):
sum=sum+l[i-1]
print(sum)

18
TOPIC: Computer Systems
1. Identify the RLE pattern for the following image. The first row has been done for you.

Image RLE Pattern

7W

2. Match the following:

Backup Animated images or


backgrounds

Disk defragmentation Used to make a copy of a


selected file

Screensaver Prevents unauthorized


access to the user’s
computer

Firewall Detects malware

Reorganises files on the


Operating System computer’s storage area

It acts as an interface
Anti-virus between the hardware and
user application software

3. Complete the following table:

Denary Binary
148

10101010

19
101

11100001

255

Working:

4. Complete the truth tables for the following logic circuits:

A B C F
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1

20
A B C Y
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1

TOPIC: NETWORKS
1. Identify two benefits and two drawbacks of networking devices.
Benefits Drawbacks

2. What do you mean by server? Give two examples of servers.

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

3. State the functions of the following network hardware.


Switch

21
Router

NIC

WAP

4. Compare and contrast wired and wireless connections.


Wired Wireless

5. Arrange the following wireless connections in increasing order of their bandwidth.


Wi-Fi, 5G, Bluetooth, 3G, 4G

…………………………………………………………………………………………………………………………………

6. Compare and contrast fiber-optic cables and copper wires.


Copper Wires Fibre optic cables

22
7. Compare and contrast serial and parallel transmission.
Serial Transmission Parallel Transmission

8. Define the following terms:


Virus

Ransomware

Spyware

Social Engineering

Brute Force attack

Operating System

9. Classify OS according to different types of interfaces.

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

23
……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

10. Identify two characteristics and two benefits of Network Operating System. Explain the
reason behind installing NOS on servers.

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

11. Identify three functions of the Operating System.

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

12. Identify two utility software and their functions.

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

24
TOPIC: Programming-III
1. Simulate the roll of a dice (between 1 and 6). Repeat the simulation for two users. The
one who gets the first 6 wins the game. Display all intermediate throw values for both
users. Also, provide the verdict of the winner.

25
2. Allow user to input the name of the user. Simulate the roll of a dice (between 1 and 6) by
the user. If the user gets a 6 within 3 throws, he/she wins the game. Display the
message as- “John, you won! You took 1 throw(s)!” If the user loses, display-“Sorry
John! Try again”. Display all the throw values.

26
3. A random number generator generates a number in the range - 1 to 10 and stores it in
variable, mystery. The program asks the user to input their name and guess a number.
Store the user inputs in variables name and guess.
If the user guesses the correct number, output that he/she has won. Else, output that he/she
has lost.
Example:
Name: John
Guess: 5
Output:
The mystery number was 7. You lost, John.
Another Possible Output:
Output:
The mystery number was 5. You won, John.

[Hint: Import random module in your program and use the randrange method]

27

You might also like