0% found this document useful (0 votes)
138 views3 pages

COMP6

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 3

Paper: Computer Science

Class: VIII
Section – I [Marks:12]
Q-1: Choose the best answer. [ /3]
i. There is no end to this loop.
a. repeat b. forever c. repeat until
ii. Which crime is demanding money to prevent a threatened attack?
a. fraud b. cyber extortion c. cyber espionage
iii. Which of the following malware displays pop-ups to users?
a. Adware
b. Worm
c. Trojan
iv. Which part of the function prompts the user to make an input?
a. parameter
b. outcome
c. body
v. What is scratch?
a. Algorithmic language
b. Textual-programming language
c. Visual programming language
vi. If ________________ feature is enabled, an infected drive inserted into the computer
will automatically open.
a. auto-open b. auto-run c. auto-start
Q-2: Fill in the blanks. [ /3]
i. _________________ software is software that has unauthorizedly used software.
ii. ___________________ are small pieces of code.
iii. A ______________________ function is already specified in the programming
environment.
iv. _____________________ is the structure of a programming language’s statements.
v. _______________________________ are designed to prevent, detect, scan and
remove malware from computers.
vi. ________________ is a programming concept that allows you to replicate a sprite.

Class: VIII Page 1 of 3 Subject: Computer Science


Q-3: Write (✓) next to the correct sentence and (X) next to the wrong one. [ /3]

i. To create a method, click the Make a block button located in my


blocks tab.
ii. When writing programs, some instructions may need to be
repeated, this is
iii. known as loop.
iv.
v.
vi.
vii.

Q-4: Fill the table with the kinds of loop suitable for each state. [ /3]
State Loop

A moving sprite stops when reaching a


specific point.
Rotate the mouse 8 times

As long as program is running, the music is


played.

Section – II [Marks:18]

Q-1: Define the following terms. [ /6]


a. Function

Class: VIII Page 2 of 3 Subject: Computer Science


b. Greed
c. Cybersecurity
Q-2: How can people reduce the risk of negative online behavior? Think of other points
aswell. [ /3]
Q-3: List three ways in which malware spread and explain how to protect against
those spreads. [ /3]
Q-4: Write a program that calculates 3 by 2, stores the value in a variable, and displays
that variable. [ /2]
Q-5: Create a mini-game called “asteroid belt” by creating a player ‘sprite’ that moves
with right and left keys and an “asteroid” sprite that clones itself every few seconds.
The clone should start moving down and deletes itself when it touches the end of the
screen. The game ends when the asteroid touches the player. [ /4]

Class: VIII Page 3 of 3 Subject: Computer Science

You might also like