Answer Keys Computing T2 Grade 8 Theory Questions
Answer Keys Computing T2 Grade 8 Theory Questions
Grade 8
Answers Keys
Theory Questions
Unit 1
Pages (125-196)
Unit 2
Pages (197-229)
1
Unit 1
1.6 Library programs (page 125)
Key Words
2. Function: a sub-routine that has an identifier and can be called from another
3. Import: to tell a program to fetch and use code from a pre-existing program library.
4. Parameter: a value that a main program sends to a function when it calls it, which
5. Procedure: a sub-routine that has an identifier and can be called from another
program but which does not return a value to the program that called it.
way.
8. Return: to send back; the action of a function when it sends a value back to the
2
Q1: Fill the blanks. Use the words in the box below:
Return)
1. Function a sub-routine that has an identifier and can be called from another
3. Parameter a value that a main program sends to a function when it calls it,
4. Procedure a sub-routine that has an identifier and can be called from another
program but which does not return a value to the program that called it.
unpredictable way.
6. Return to send back; the action of a function when it sends a value back to
7. Import to tell a program to fetch and use code from a pre-existing program
library.
3
Questions 1.8 (page 148)
The answer: A set of pre-written sub-routines that you can use in python program.
The answer: To save programmers time, so programmers do not need to write sub-
The answer: Anyone can write one and you don’t know what the code does, so you
4
6. What does the function math.ceil() do?
The answer: Round the number in the brackets up to the next whole number
print(math.floor(9999.9999))
print(math.ceil(9999.9999))
print(random.randint(2, 8))
9. What are the possible numbers that this function call could return?
random.randint(100, 103)
5
1.7 Software development
Key Words
1. Boundary test data: data that is on the edge of being accepted; for example, if a
number has to be 1 or more, then 1 is boundary test data.
2. Decomposing: splitting a problem into smaller sub-problems; breaking something
down into different parts.
3. Decomposition: the process of splitting a problem into smaller sub-problems that are
easier to solve.
4. Invalid test data: data that a program should not accept, but that might produce a
message, for example, ‘That is not a valid option’.
5. Iteration: repetition of a process or cycle.
6. Iterative: repeating; when the same cycle or set of processes is done multiple times.
7. Iterative development: a method of developing a program one part at a time by
repeating cycles of development, testing, amending and improving until the
program is complete.
8. Normal test data: data that a program should accept.
9. Predict: to say what you think will happen based on what you can see; with a
program, this is stating what output will result from certain inputs without actually
running the program.
10. Sub-problems: individual problems that result from breaking a large problem into its
parts; we can solve the smaller, easier sub-problems separately and then combine
the results to solve the original larger problem.
11. Test plan: a formal structure that identifies how a program will be tested, which
usually includes the type of test data we will use, the data we will enter, the element
we will test and the result we expect.
6
Questions 1.9 (page 159)
To make them easier to program, to identify repeated code, to divide the problem
between multiple programmers, to increase the speed of writing the program.
Repeating
7
Q1: Fill the blanks. Use the words in the box below:
Q2: Fill the blanks. Use the words in the box below:
2. Predict to say what you think will happen based on what you can see; with a
program, this is stating what output will result from certain inputs without actually
into its parts; we can solve the smaller, easier sub-problems separately and then
4. Test plan a formal structure that identifies how a program will be tested, which
usually includes the type of test data we will use, the data we will enter, the element
8
Questions 1.11 (page 171)
To make sure all valid data is accepted, all boundary data is accepted or rejected as
required and that all invalid data is rejected.
Key words
1. Group ID: an identification number that groups micro:bits into sets of devices that
can transmit and receive each other’s data, but cannot receive data from other
groups.
2. Radio waves: a type of electromagnetic radiation that we use to transmit data
wirelessly
3. Wired transmission: a physical connection between two devices; data is sent from
one device to another through a wire, such as a copper cable.
4. Wireless transmission: a connection between two devices that uses radio waves, not
wires, to transmit data; types of wireless connection include Bluetooth Wireless
Technology and wi-fi.
9
Q1) Look at the following programs below and answer the questions:
10
Questions 1.12 (page 190)
3. Why do you need to make sure you are using a unique group ID when programming
So that you do not pick up transmissions from other micro:bits, or transmit data to other
micro:bits
4. When a micro:bit receives data (for example, a number) where is this stored?
In a variable
Any way you would use any other data, for example, in calculations.
11
Unit 2
Managing data
2.1 Modelling (page 197)
Key words
2. Goal seek: a tool in spreadsheet software that tells you what certain values in the
or interesting.
4. Model: a computer file or program that represents a real-life system or process where
5. Simulator: a type of computer model that provides a realistic copy of how a real-life
6. What-if analysis: changing values in a spreadsheet to see what effect the changes
12
Q1: Fill the blanks.
Key words
1. goal seek a tool in spreadsheet software that tells you what certain
values in the spreadsheet need to be in order to achieve a goal that you set.
important or interesting.
2. The __________ tool in spreadsheet software helps you find what certain __________
need to be in order to achieve a goal you set.
a) Key feature, options
b) Simulator, changes
c) Goal seek, values
13
3. __________ involves changing __________ in a spreadsheet to see what effect the
changes have on other values.
a) Goal seek, outputs
b) What-if analysis, values
c) Feature, key aspects
14
2.2 Data and databases (page 212)
Key words
1. Field: a collection of the data about one aspect of every record (row) in a
4. Primary key: a field in a database that gives each record a unique entry to identify it.
6. Record: the set of data about a single object in a database, made up of one data
7. Validation: rules for the data that a user enters into a field.
8. Wizard: a tool in some software that gives the user step-by-step instructions on how to
It may not be possible to use the data for its intended purpose, or it could lead to
something negative happening.
15
Questions 2.2 (page 223)
The information that is output and the options that are given by the simulator.
It changes the values in a spreadsheet to see what effect the changes have on other
values in the spreadsheet in order to find the outcome to a what-if question.
16
5. Draw a line to match each term with the correct definition.
6. Copy the table with the descriptions onto a piece of paper. Complete the table with
the name of the validation rule for each description.
Length check
Range check
Presence check
7. What are two things we can check when evaluating the suitability of a database for
a given purpose?
One: all the data that is stored is necessary; two: the data is accurate.
17