0% found this document useful (0 votes)
28 views

Answer Keys Computing T2 Grade 8 Theory Questions

Uploaded by

rj9w5kq6f4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Answer Keys Computing T2 Grade 8 Theory Questions

Uploaded by

rj9w5kq6f4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Computing Department

Grade 8
Answers Keys

Theory Questions
Unit 1
Pages (125-196)

Unit 2
Pages (197-229)

Academic Year 2024/2025

)Cambridge International School(

1
Unit 1
1.6 Library programs (page 125)
Key Words

(Function , Program library, Import , Parameter , Procedure, Call , Random number ,


Return)

1. Call: the command in an algorithm that executes a sub-routine.

2. Function: a sub-routine that has an identifier and can be called from another

program – it returns a value to the program that called it.

3. Import: to tell a program to fetch and use code from a pre-existing program library.

4. Parameter: a value that a main program sends to a function when it calls it, which

the function uses when it executes.

5. Procedure: a sub-routine that has an identifier and can be called from another

program but which does not return a value to the program that called it.

6. Program library: a collection of useful pre-written sub-routines that we can import

and use in our programs.

7. Random number: a number a computer generates by choosing in an unpredictable

way.

8. Return: to send back; the action of a function when it sends a value back to the

program that called it.

2
Q1: Fill the blanks. Use the words in the box below:

(Function , Program library, Import , Parameter , Procedure, Call , Random number ,

Return)

1. Function a sub-routine that has an identifier and can be called from another

program – it returns a value to the program that called it.

2. Call the command in an algorithm that executes a sub-routine.

3. Parameter a value that a main program sends to a function when it calls it,

which the function uses when it executes.

4. Procedure a sub-routine that has an identifier and can be called from another

program but which does not return a value to the program that called it.

5. Random number a number a computer generates by choosing in an

unpredictable way.

6. Return to send back; the action of a function when it sends a value back to

the program that called it.

7. Import to tell a program to fetch and use code from a pre-existing program

library.

8. Program library a collection of useful pre-written sub-routines that we can

import and use in our programs.

3
Questions 1.8 (page 148)

1. What is a program library?

The answer: A set of pre-written sub-routines that you can use in python program.

2. Why are program libraries used?

The answer: To save programmers time, so programmers do not need to write sub-

routines that have already been written by someone else.

3. Why do you have to be careful when using program libraries?

The answer: Anyone can write one and you don’t know what the code does, so you

need to make sure they do not contain malware like viruses

4. What is the command in Python to import a library into your program?

The answer: import

5. What is the function call to round down the number 44.56?

The answer: math.floor(44.56)

4
6. What does the function math.ceil() do?

The answer: Round the number in the brackets up to the next whole number

7. What will this program output?

print(math.floor(9999.9999))

print(math.ceil(9999.9999))

The answer: 9999

The answer: 10000

8. Which library does this code use?

print(random.randint(2, 8))

The answer: Random

9. What are the possible numbers that this function call could return?

random.randint(100, 103)

The answer: 100, 101, 102, 103

5
1.7 Software development

Key Words

(boundary test data , decomposing, decomposition, invalid test data , iteration,


iterative , iterative development, normal test data , predict , sub-problems , test plan)

1. Boundary test data: data that is on the edge of being accepted; for example, if a
number has to be 1 or more, then 1 is boundary test data.
2. Decomposing: splitting a problem into smaller sub-problems; breaking something
down into different parts.
3. Decomposition: the process of splitting a problem into smaller sub-problems that are
easier to solve.
4. Invalid test data: data that a program should not accept, but that might produce a
message, for example, ‘That is not a valid option’.
5. Iteration: repetition of a process or cycle.
6. Iterative: repeating; when the same cycle or set of processes is done multiple times.
7. Iterative development: a method of developing a program one part at a time by
repeating cycles of development, testing, amending and improving until the
program is complete.
8. Normal test data: data that a program should accept.
9. Predict: to say what you think will happen based on what you can see; with a
program, this is stating what output will result from certain inputs without actually
running the program.
10. Sub-problems: individual problems that result from breaking a large problem into its
parts; we can solve the smaller, easier sub-problems separately and then combine
the results to solve the original larger problem.
11. Test plan: a formal structure that identifies how a program will be tested, which
usually includes the type of test data we will use, the data we will enter, the element
we will test and the result we expect.

6
Questions 1.9 (page 159)

1. What does decomposition mean?

Breaking something down into smaller pieces.

2. How do you decompose a problem?

Split it into smaller sub-problems.

3. Why do we decompose problems?

To make them easier to solve.

4. Why do we decompose programs?

To make them easier to program, to identify repeated code, to divide the problem
between multiple programmers, to increase the speed of writing the program.

Questions 1.10 (page 162)

1. What does iterative mean?

Repeating

2. What is iterative development?

Repeating development in cycles of programming, then testing, then changing or


adding to the program, then testing and so on . . . doing this repeatedly until the
program is finished.

7
Q1: Fill the blanks. Use the words in the box below:

(iterative development , iterative , decomposing, invalid test data , iteration,


normal test data)

1. Decomposing splitting a problem into smaller sub-problems; breaking


something down into different parts.
2. Invalid test data data that a program should not accept, but that might
produce a message, for example, ‘That is not a valid option’.
3. Iteration repetition of a process or cycle.
4. Iterative repeating; when the same cycle or set of processes is done multiple
times.
5. Iterative development a method of developing a program one part at a time by
repeating cycles of development, testing, amending and improving until the
program is complete.
6. Normal test data data that a program should accept.

Q2: Fill the blanks. Use the words in the box below:

(boundary test data , decomposition , predict , sub-problems , test plan)

1. Boundary test data data that is on the edge of being accepted.

2. Predict to say what you think will happen based on what you can see; with a

program, this is stating what output will result from certain inputs without actually

running the program.

3. Sub-problems individual problems that result from breaking a large problem

into its parts; we can solve the smaller, easier sub-problems separately and then

combine the results to solve the original larger problem.

4. Test plan a formal structure that identifies how a program will be tested, which

usually includes the type of test data we will use, the data we will enter, the element

we will test and the result we expect.

5. Decomposition: the process of splitting a problem into smaller sub-problems

that are easier to solve.

8
Questions 1.11 (page 171)

1. What are the three types of test data?

Normal, invalid and boundary

2. Why do you test a program multiple times?

To make sure it always works with different test data types

3. Why do you test a program with different types of data?

To make sure all valid data is accepted, all boundary data is accepted or rejected as
required and that all invalid data is rejected.

1.8 Physical computing

Key words

(group ID, radio waves, wired transmission, wireless transmission)

1. Group ID: an identification number that groups micro:bits into sets of devices that
can transmit and receive each other’s data, but cannot receive data from other
groups.
2. Radio waves: a type of electromagnetic radiation that we use to transmit data
wirelessly
3. Wired transmission: a physical connection between two devices; data is sent from
one device to another through a wire, such as a copper cable.
4. Wireless transmission: a connection between two devices that uses radio waves, not
wires, to transmit data; types of wireless connection include Bluetooth Wireless
Technology and wi-fi.

9
Q1) Look at the following programs below and answer the questions:

Micro:bit 1 has this program:

Micro:bit 2 has this program:

a. What data is transmitted when the user presses Button A on micro:bit 1?


10

b. What data is transmitted when the user presses Button B on micro:bit 1?


20

c. What data is transmitted when the user presses Button A on micro:bit 2?


It shows the heart Icon

10
Questions 1.12 (page 190)

1. How is data transmitted from one micro:bit to another?

Wirelessly, using radio waves

2. What type of data can be transmitted from one micro:bit to another?

Numbers and strings (and others)

3. Why do you need to make sure you are using a unique group ID when programming

two micro:bits to transmit data between each other?

So that you do not pick up transmissions from other micro:bits, or transmit data to other

micro:bits

4. When a micro:bit receives data (for example, a number) where is this stored?

In a variable

5. How can you use the data a micro:bit receives?

Any way you would use any other data, for example, in calculations.

11
Unit 2
Managing data
2.1 Modelling (page 197)

Key words

(feature, goal seek, key feature, model, simulator, what-if analysis)

1. Feature: one aspect of something, such as a piece of information that is output or an

option a system presents to a user.

2. Goal seek: a tool in spreadsheet software that tells you what certain values in the

spreadsheet need to be in order to achieve a goal that you set.

3. Key feature: an aspect of something (such as a system) that is particularly important

or interesting.

4. Model: a computer file or program that represents a real-life system or process where

data is changed to see what happens.

5. Simulator: a type of computer model that provides a realistic copy of how a real-life

system or scenario works.

6. What-if analysis: changing values in a spreadsheet to see what effect the changes

have on other values in the spreadsheet.

12
Q1: Fill the blanks.

Key words

(simulator, what-if analysis , key feature, model, feature, goal seek)

1. goal seek a tool in spreadsheet software that tells you what certain

values in the spreadsheet need to be in order to achieve a goal that you set.

2. simulator a type of computer model that provides a realistic copy of

how a real-life system or scenario works.

3. what-if analysis changing values in a spreadsheet to see what effect the

changes have on other values in the spreadsheet.

4. feature one aspect of something, such as a piece of information that is

output or an option a system presents to a user.

5. key feature an aspect of something (such as a system) that is particularly

important or interesting.

6. model a computer file or program that represents a real-life

system or process where data is changed to see what happens.

Q2: Choose the correct answer.

1. A __________ is one aspect of something, such as a piece of information that is


__________ or an option a system presents to a user.
a) Simulator, copied
b) Feature, output
c) Goal seek, calculated

2. The __________ tool in spreadsheet software helps you find what certain __________
need to be in order to achieve a goal you set.
a) Key feature, options
b) Simulator, changes
c) Goal seek, values

13
3. __________ involves changing __________ in a spreadsheet to see what effect the
changes have on other values.
a) Goal seek, outputs
b) What-if analysis, values
c) Feature, key aspects

Q3: Choose the Correct Answer.

1. Which of the following best describes Simulator?


a) A tool to adjust spreadsheet values
b) A realistic copy of how a real-life system works
c) A list of key features in a system

2. What is a Key Feature?


a) A particularly important aspect of a system
b) A tool for analysing spreadsheet data
c) A realistic copy of a system or process

3. What does Goal Seek help with?


a) Simulating a real-life system
b) Adjusting spreadsheet values to reach a target
c) Identifying key features of a system

Q4: True or False Questions

1. A model is a realistic copy of a real-life system, often used in simulations.


Answer: _____ True _____
2. What-if analysis is about finding the most important features of a system.
Answer: _____ False _____
3. Goal seek and what-if analysis are tools used in spreadsheet software.
Answer: _____ True _____

14
2.2 Data and databases (page 212)
Key words

(field, format, null , primary key, purpose, record, validation, wizard)

1. Field: a collection of the data about one aspect of every record (row) in a

database, such as date of birth; a column in a database table.

2. Format: the structure of an item of data.

3. Null: unknown or missing.

4. Primary key: a field in a database that gives each record a unique entry to identify it.

5. Purpose: the reason why something exists – what is it for?

6. Record: the set of data about a single object in a database, made up of one data

item from each field (column); a row in a database table.

7. Validation: rules for the data that a user enters into a field.

8. Wizard: a tool in some software that gives the user step-by-step instructions on how to

complete a task as they are doing it.

Questions 2.1 (page 216)


1. Why it is important that data collected is suitable for its purpose?

The data will not be useful if it is not suitable.

2. What could happen if data is incomplete or missing?

It may not be possible to use the data for its intended purpose, or it could lead to
something negative happening.

15
Questions 2.2 (page 223)

1. What is a data collection form?

A paper-based or digital form that is used to collect data for a purpose.

2. Can you name three different validation rules?


Any three from: presence check, format check, length check, range check.
3. Why is validation used?

To make sure that the data collected is accurate.

Check your progress 2 (page 229)


1. State the purpose of a simulator.

To provide a realistic copy of how a real-life system or scenario works.

2. Give two examples of a simulator.

Any two from: flight simulator, surgery simulator, driving simulator.

3. State what is meant by a feature of a simulator.

The information that is output and the options that are given by the simulator.

4. Explain what what-if analysis means.

It changes the values in a spreadsheet to see what effect the changes have on other
values in the spreadsheet in order to find the outcome to a what-if question.

16
5. Draw a line to match each term with the correct definition.

6. Copy the table with the descriptions onto a piece of paper. Complete the table with
the name of the validation rule for each description.

Length check

Range check

Presence check

7. What are two things we can check when evaluating the suitability of a database for
a given purpose?

One: all the data that is stored is necessary; two: the data is accurate.

17

You might also like