You are on page 1of 3

Paper: Computer Science

Class: VIII
Section – I [Marks:12]
Q-1: Choose the best answer.
i. There is no end to this loop.
a. repeat b. forever c. repeat until
ii. Which crime is demanding money to prevent a threatened attack?
a. fraud b. cyber c. cyber
espionage extortion
iii. Which of the following malware displays pop-ups to users?
a. Adware c. Worm
b. Trojan
iv. Which part of the function prompts the user to make an input?
a. parameter c. outcome
b. body
v. What is scratch?
a. Algorithmic language c. Textual-programming
b. Visual programming language language
vi. If ________________ feature is enabled, an infected drive inserted into the computer
will automatically open.
a. auto-open b. auto-run c. auto-start
Q-2: Fill in the blanks.
i. _________________ software is software that has unauthorizedly used software.

ii. ___________________ are small pieces of code.

iii. A ______________________ function is already specified in the programming environment.

iv. _____________________ is the structure of a programming language’s statements.

v. _______________________________ are designed to prevent, detect, scan and remove

malware from computers.

vi. ________________ is a programming concept that allows you to replicate a sprite.

Class: VIII Page 1 of 3 Subject: Computer Science


Q-3: Write (✓) next to the correct sentence and (X) next to the wrong one. [ /3]

i. To create a method, click the Make a block button located in my blocks ________
tab.
ii. When writing programs, some instructions may need to be repeated, this ________
is known as loop.
iii. Antivirus software protects only from worms and trojans but not viruses. ________
iv. The punishment for unauthorized access to information or data in the ________
Pakistani cybercrime law is imprisonment for 3 months and a fine of Rs
50,0000.
v. A trojan is a computer software that replicates itself while moving across ________
computers.
vi. Comment lines in java are not executable. ________

Q-4: Fill the table with the kinds of loop suitable for each state. [ /3]

State Loop

A moving sprite stops when reaching a


specific point.
Rotate the mouse 8 times

As long as program is running, the music is


played.

Class: VIII Page 2 of 3 Subject: Computer Science


Section – II [Marks:18]

Q-1: Define the following terms. [ /6]


a. Function
b. Greed
c. Cybersecurity
Q-2: How can people reduce the risk of negative online behavior? Think of other points
aswell. [ /3]
Q-3: List three ways in which malware spread and explain how to protect against
those spreads. [ /3]
Q-4: Write a program that calculates 3 by 2, stores the value in a variable, and displays
that variable. [ /2]
Q-5: Create a mini-game called “asteroid belt” by creating a player ‘sprite’ that moves
with right and left keys and an “asteroid” sprite that clones itself every few seconds.
The clone should start moving down and deletes itself when it touches the end of the
screen. The game ends when the asteroid touches the player. [ /4]

Class: VIII Page 3 of 3 Subject: Computer Science

You might also like