Comp 8th Notes
Comp 8th Notes
15) The network which provides communication overs a short distance, less than
10 meters is called:
A. MAN ✓B. PAN C. VPN D. LAN
LAN WAN
1. Wired required a physical path 1. Wireless does not require physical path
for transmission. for transmission.
Ans:
PAN VPN
1. The basic unit of a worksheet into which you enter data in Excel is called a
2. Which Microsoft Excel function is used to find the highest value in the given range?
2. Why are spread sheets used? OR What are the uses of spread sheets?
• To perform calculations
Cell: each box in an excel worksheet is called as cell. It is intersection of rows and
columns. Each cell is identified by a unique address.
Row: a horizontal collection of cell is called row. Each row has a unique row
number
Column: a vertical collection of cell is called column. Each column has a unique
name consisting of one or more alphabets.
Work book: It is the collection of worksheets. By default, it has 3 work sheets but we
can add more sheets. An Excel document is called workbook.
Active cell: A cell that is ready to accept data is called an active cell. It is identified by
a bold border.
Cell address: Each cell in an excel worksheet is identified by a unique name called cell
address. It consists of name followed by row number e.g. A2, X3 etc.
4. Differentiate between copy and cut command.
Ans: Cut: Cut command removes the selection and puts it on clip board. Which can be
pasted anywhere. It simply moves the data
Copy: It makes duplicate of the selection and puts it on clipboard which can be pasted
anywhere at many places
Work book: It is the collection of worksheets. By default, it has 3 work sheets but we
can add more sheets. An Excel document is called workbook.
Ans: A function is a predefined formula which quickly calculates the result of the given
values. e.g. SUM(C5: E5)
e.g. SUM(C5:B10) will find the sum of all the values of cells B5 to B10.
e.g. AVERAGE(B5:B10) will find the average of all the values of cells B5 to B10.
IF(): If is used to return a value out of given values depending upon applied
conditions.
e.g. IF(B5>=33, “PASS, FAIL”) will show PASS if marks are greater and FAIL
otherwise.
e.g. MAX(B5:B10) will find the greatest values among all values in cells B5 to B10.
e.g. MIN(B5:B10) will find the smallest values among all values in cells B5 to B10.
Ans: Chart is a graphical representation of data ina worksheet. It is used for easy and
quick analysis. Some types of chart are:
• Bar chart
• Line chart
• Pie chart
Ans: Formula bar is located above the frame. It is used to enter or show the formula
or function in a cell.
Ans: It combines two or more cells to form a single larger cell and centers the contents.
Computer Studies-VIII
13. What do you mean by formatting a worksheet?
Ans: Formatting means to set the layout of a document to make it readable and
presentable.
Ans: Format painter is used to apply the formatting of a particular selection to the
other part of document. It offers an easier way to copy formatting from one part
of our spread sheet to another without spending a lot of time to replicate our
formatting manually.
Ans: Wrap text option is used to present long text in multiple lines with in a cell so that
it can be viewed fully.
Ans: Spelling is used to check the correct spellings of text while thesaurus suggests
alternative words of a particular word.
Computer Studies-VIII
18. Define the following short-cut commands.
Computer Studies-VIII
Computer Studies-VIII
Unit 03: Algorithm Thinking and Problem Solving
Multiple Choice Questions MCQs
a) ✓Nanoseconds b) Minutes
c) Hours d) Week
c) ✓Flowchart d) Graph
a) Tested b) ✓Executed
c) Implemented d) counted
6. Value of variable is
Computer Studies-VIII
c) Four d) ✓as many as required
8. can be directly input into the computers
a) Pseudo code b) Flowchart
c) ✓code d) algorithm
Ans The process of analyzing some particular situation and behaving accordingly in
order to generate some response.
Input are data that we enter with the help of input devices like keyboard,
mouse and scanner etc. while processor process data and output are the
processed data or information. While data and information store in memory
location.
Ans. Nested loops are important in arranging a calendar because year consist on
months (outer loop), month consist of weeks (inner loop) and further month
consist seven days (sub inner loop).
Q.5 Differentiate between scope and limitation of problem.
Ans. The scope defines the boundaries of what a solution must provide to meet the
requirements, where the limitation of problem refers to the aspects that are
beyond the study/implementation of the problem.
Q.6 Write an algorithm that allows a user to check whether the input is even or
odd.
Line 0 Start
Ans. Program is the set of instructions which are written in a programming language
to solve a problem.
Ans. “Pseudo code” are helpful for the programmers to interpret the algorithm into
any programming language of programmer’s choice. Pseudo code is
pronounced by keeping the first character ‘P’ silent and breaking the reaming
word into two parts so ‘pseudo’ and ‘code’.
5. Where will be the sprite located if value of ‘ Var ’ variable comes out to be 10
in the following code block? a) 0,0
b) 0, 100
c) 100, 0
d) ✓100, -100
1. For the following code block sprite will turn to 30 degrees. How many clicks
are required for sprite to complete a full cycle?
Ans: 12 clicks are required for a sprite to complete a full cycle.
Ans:
Follow the instruction given in the question and perform the activity by using
scratch programming in your computer.
What to do:
Open the scratch program duplicate the map maze and remain its
manemap2, next, change the color of lines in the new map from blue to red.
Add scripts such that the games become a multi-level game with 2 distinct
images.
4. Take a 4-digit number as input for a year and check if the year is leap year or
not. Display your output as: the year 1979 is not a leap year or the year 2020
is a leap year.
Ans: program:
# year divided by 4 is a leap year elif(year % 4==0) and (year % 100 !=0)
Print (“{0} is a leap year”. Format(year))
# if not divided by both 400 (century year) and 4 (not century year)
# Year is not leap year Else:
Print (“{0} is not a leap year”. Format (year))
Output:
Ans: program:
def rectangle_area(self):
return self. Length*self. Width
Output:
Rectangle area 120
6. Write a program in python for the following output [print a star triangle].
Ans:
# Printing stars
Print(“* “, end=””)
# ending line after each row
Print(“\r”)
#Driver Code
n=5 triangle(n)
output:
*
* *
* * *
* * * *
* * * * *
7. write a program in python that display squares of the numbers and print in the
form of triangle.
Ans:
Output:
1
49
16 25 36
49 64 81 10
Computer Studies-VIII
UNIT 05: DIGITAL CITIZENSHIP
Multiple Choice Questions MCQs
Ans: Cyber scout is a person with unique aim to promote awareness about
cybercrime in the society. A cyber is trained to identity cybercrime activities, and
equipped with adequate preventive knowledge to help fight this menace. He
understands the risks associated with virtual socializing and works to promote
cyber safety in his surrounding environment. A cyber scout plays a vital role to
create cyber awareness among fellow students, teachers and parents.
Ans: Cybercrime laws are standard of acceptable behavior for information and
communication technology (ICT) users. Rapidly increasing rate of internet
penetration in our country, Pakistani authorities have also started to take
necessary measures to keep people and their data safe in the online world. The
more people rely on online services in our country and they become susceptible to
internet crimes.
Ans: It’s necessary for most users to take some measures preventing their
computer from unauthorized access. Protection of sensitive data should be top of
mind and a high priority in all organization. Not only to ensure your computer want
be used by others, but also reduce the possibility for internet threats like hacker
and some malware.
Benefits of copyright
Exclusive use;
Once you get copyright for your work, others cannot use it without permission. If
any infringement take place, you can carry out legal actions
Preventing misuse;
You can prevent misuse of your work by registering a copyright you will have more
control over how it is presented to the public
Economic gain;
The most crucial benefit is the economy you derive from the same. You will have
the sole right to any revenue that occurs from your original work.
Ans: Digital piracy means illegally copying digital content in any form without the
consent of owner. Digital piracy is cybercrime as it is violation of the owner’s
copyright. People who practice digital piracy are called digital pirates. Copying a
music file or confidential video, all source illegally copying and distributing digital
content refers to digital piracy.
6. Why hackers break into computer system?
Ans: Hackers break into computer system to steal data, funds, and critical business
information without the owner’s consent. Any connected system is at risk of being
exploited by computer hackers. Is cyber criminal’s access to your system, they can
engage in financially and personally costly activities that are difficult to recover
from.
7. How spyware can be harmful?
Ans: Spyware will track web browsing history, passwords and other private
information, such as E-mail addresses, credit cards number, personal identification
number, or banking records. All of this information can be gathered and use for
identity theft or sold to third parties.
8. Define cyber-crime?
Ans: It is a criminal activity carried out by means of computer or the internet. For
example, pishing, emails, cyber stalking, identify theft etc.
9. Define computer ethics?
Ans: It is the application of moral principle to use of computers and the internet.
Examples include, intellectual property rights, privacy policies, online etiquette,
etc.
10. Define digital plagiarism?
Ans: It is an act of copying and publishing another person’s work without proper
citation. It’s like stealing someone else’s work and releasing it as your own work.
a) Marketing strategy
b) Sales strategy
c) ✓Operations
d) Digital marketing
2. Which of the following is the example of quality assurance?
a) Validation
b) Verification
c) Documentation
d) ✓Software testing
3. Digital marketing is often referred to as ?
a) Billboard
b) ✓Online marketing
c) TV
d) Radio
4. Social media marketing is a type of ?
a) ✓Digital marketing
b) Traditional marketing
c) Industrial marketing
d) Telemarketing
5. Which type of the following the element of marketing?
a) Product, price, promotion and people
i. Customer needs
iii. Costing
A business plan includes the set-up estimated cost like legal cost, attorney
fees and licensed fee etc. the plan should also include funding to cover other
expenses, revenue collected against sale and profit or loss.
iv. Operation
v. Marketing
Ans:
i. Product
A product (goods and services) is a main entity which your business offers
to the end users. What make your product to be purchased verses the
products offered by the competitors.
ii. Price
iii. Promotion
iv. Place
The success of the business also based on the location of the outlet and the
made of sell either by e-commerce or telephone or will your product be
carried in retail outlets?
Ans:
Payment; It is the transfer of money against the purchase of goods and services.
Ans: Quality assurance focus on improving the development process and make it
an efficient and effective as per the quality standards defined for the products.
That’s why quality assurance is important to assess the quality of product or
services.
Ans:
Advantages Disadvantages
issues
Wins customer loyalty Worldwide competitions
through globalization
8. Define SEO?
• Debit card
• Interbank transfer
• Easypaisa
• Jazzcash