0 ratings 0% found this document useful (0 votes) 166 views 36 pages Computer Guess Paper
The document is a school-based assessment for a computer subject covering various topics such as robotics, algorithms, email usage, and digital marketing. It includes multiple-choice questions, definitions, and practical tasks related to computer science concepts. Additionally, it emphasizes the importance of good email habits and outlines the significance of business plans and digital media bias.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save computer guess paper For Later
SCHOOL BASED ASSESMENT
Final Term \2 COMPUTER
Objectives = 48 Marks
Subjective = 52 Marks -2u%24
Question No.1: The term that is used for studying robot design,
s
development, and operation is:
(a) Artificial intelligence @ Robotics
(c) 3D printing
(d) Virtual realityQuestion No.2: The number of threads in Core i7 processors are:
(a) 24 @ (c) 26 (d) 28
Question No.3: The port type that is used for hard drives is:
Question No.4: The feature used to add a table to organize data in
usB
(b) Type the document is:
oun d) HOME (a) Header and Footer b) Insert Table
(€) Page Layout id) Mail MergeQuestion No.5: The shortcut key used to check spelling is:
(a) FL (b)F2 @r (a)F9
Question No.7: Select the set of images, text, video, and audio.
(a) Normal presentation
Qhuitimedia presentation
Question No.9: An Email account is created using:
Adatabase software Q An emailservice
| A graphic program
(b) Video presentaion
(4) Audio presentation
(c)Atext editor
Question No.11: An algorithm must be:
ic) Time
(a)Complex Feasible (d) Unclear
consuming
Question No.6: The shorteut key for the cut function is:
@
Question No.8; In an Email, the 'To' field contains the recipient's:
(bj Secondary, @pPrimary
Address address
tS,
(a) Message (d) Attachments
Question No.10: Identify the authentication type that uses
physical characteristics for verification.
(a) Certificate based Q@eiomerric based
(c) Password based (d) Email based
Question No.12: Breaking down the complex problems into
smailer parts is known as:
(9 Pecomposition
straction (4) Algorithm Design
ErasQuestion No.5: The shortcut key used to check spelling is:
(a) FL (b)F2 @r (a)F9
Question No.7: Select the set of images, text, video, and audio.
(a) Normal presentation
Qhuitimedia presentation
Question No.9: An Email account is created using:
Adatabase software Q An emailservice
| A graphic program
(b) Video presentaion
(4) Audio presentation
(c)Atext editor
Question No.11: An algorithm must be:
ic) Time
(a)Complex Feasible (d) Unclear
consuming
Question No.6: The shorteut key for the cut function is:
@
Question No.8; In an Email, the 'To' field contains the recipient's:
(bj Secondary, @pPrimary
Address address
tS,
(a) Message (d) Attachments
Question No.10: Identify the authentication type that uses
physical characteristics for verification.
(a) Certificate based Q@eiomerric based
(c) Password based (d) Email based
Question No.12: Breaking down the complex problems into
smailer parts is known as:
(9 Pecomposition
straction (4) Algorithm Design
ErasQuestion No.13: The types of algorithms are: Question No.14: The symbol used to represent a decision in a flow
a)3 - b)4 charts:
@: id) 6 (a) Oval (b) Rectangle Q@Diamone (¢) Arrow
Question No.15: IF statement executes the statement only, ifthe
given condition is:
(a) False or ic) Two
‘Question No.16: The type of structure that has an explicit end and
executes for a fixed number of times is:
(a) infinite Loop (Finite Loop (c) Selection _(¢) SequenceQuestion No.17: Electronic switches in computer system are
represented by:
d) Special
& characters
Question No.19: The bit rate refers to the number of:
@pis c) Frequency
Question No.21: The binary equivalent of 8 is:
(a) 100 (bo) 19
(a)Alphabets —_(b) Symbols
nd One
(a) Byte
(d) Bandwidth
% 7
WEN
t ER BL Typos
+ The decimal number system is also known as:
Q Hindu-ardic system
d) Hexadecimal system
Question No.20: Convert 1001 into a decimal system.
@7 08 @ (6) 10
Question No.22: In 8 bit number system (R=128, G=128, B=128)
represents:
(a) Red color 'b) Green color oy color —_(d) White colorQuestion No.23: Pixels are made up of: Question No.24: An ethical Issue is:
(2) Decimals Q@ Binary Numbers @
id
(a) Marketing _(b) Browsing (¢) Citizenship
(¢) Programs
Images Confidentiality
Question No.25: Types of plagiar
(a2 Ou
Question No.26: Unauthorized modification of files can
¢)7 compromise:
(a) Performance (b) Trust Cpirtearity (CapacityQuestion No.27: A typical platforms where cyberbullying takes
place:
6) Search
(a) Desktop fb) Memory Unit Qs Media Engine
Question No.29: Financial documents should include:
G@ Financial statements
Question No.31: Complete agreement between a buyer and seller
to exchange goods is:
(a) Payment b) Management
Q trsaction (d) Marketing
ne L lh Fis
wee I enw
Question No.28: The components of a business plan are:
(06
(a8
@ ?
‘Question No.30: Select the process that helps a business adhere to
its product's quality standards.
(a) Payments Oe ity Control
(€) Value Proposition (6) Promotion
Question No.32: In marketing, search engine optimization helps
to:
(2) Decrease tr @increase visibility
(4) Ignore customers
(c) Hide informationQuestion No.1: The company that has been developing and using Question No.2: Intel Core i7 - 12700 processor having Processor
self-driving cars for many years is: Base Power is:
1@ Tesla (b) Suzuki (c) Honda (d) Toyota (a) 35W @aw ( 60w (¢) ssw
Question No.3: Select the I/O port that is used forfast charging. Question No.4: The feature used to add a table to organize data in
(a) SATA @ typec ic) HOM (a PCE the document is:
(a) Header and Footer @ insert Table
(¢) Page Layout (4) Mail Merge
Question No.5: The option used to viewa template previewin MS Question No.6: Ctrl*Vis used for:
Word Is: (2) Copy Cppase (2) Cut (d) Save
(a) Save Demplate —_(<) Delete d) Rename
wo
fis
-SU- LlynQuestion No.7: Select the set of images, text, video, and audio.
(a) Normal presentation
Qu timedia presentation
Question No.9: The symbol that is the mar
is
as (o* @e (Oe
Question No.11: The first step in computational thinking is:
Q understanding problem
) Presenting solution
b) Video preser
tory part of the Emait
Jentitying tools
ing code
Question No.8: The first step to sign in to a Gmail account is:
(6) Phone
Number
a) Name b) Password Email address
Question No.10: When you are not using your account, you must:
Q Leout (¢) Save
password
Question No.12: The primary goal of computational thinking is:
(2) To create complex algorithms
@ solve probiem using
computer
(a) Login c) Delete
b) To write efficient code
i) To display a videoQuestion No.13: Identify the primary focus of p:
(a) Creating designs
Qinding patterns
Question No.15: Abstraction and generalization help in problem-
solving by:
recognition. Question No.14: Diamond symbol in a flowchart is used for:
Q@pecision making
or action (d) Start or End of flowchart
tions (c) Apr
(a) Solving problems ) While loop
Qyeroning dea
Question No.17: The number of bytes in 1KB are: Question No.18: The decimal number system is also known as:
(a) 1280 (b) 1080 Q@wx (¢) 1022 (a) Binary system QDiiindu-arabic system
(c) Octal system 4) Hexadecimal system
BLAIS Ie LR dea,Question No.19: The difference between the binary and the Question No.20: Convert binary number (1102), to a decimal
number.
(a) 14 @» (912 (ua
Question No.22: Select a binary number.
(@) (20a,
10.24: The principles, we have to follow when we are
@rwou @u
Question No.23:; Pixels are made up of
a) Decimals @ Binary Numbers online are:
( i
(c) Programs (6) Digital images Drieialetics (o)Moratethics [CPO 4) social ethics
ethics
Question No.25: The term used for intellectual property that Question No.26 : Improper use of computer resources often leads
protects the original work of an owner: to:
(a) Piracy copyright (c) Plagiarism _(d) Ethics (a) Security (b) Efficiency (¢) Profit Q Wegat use
rt OL TSU 3 Ue ZF desyQuestion No.27: A users activity can be tracked through:
Question No.28 : A business plan is essential for setting up a
(a) Firewall Q) cookies successful business because:
(c) Router
id) Keyboard (a) Focuses only on marketing @) Outlines goals and strategies
(c) Uses unstructured ideas (d) Concentrates on product
Question No.29: The marketing strategy is important ina business Question No.30: Select the benefit of promotion in a business.
plan because: act more
(a)Decreasescustomerinterest
@ tt outlines how to reach mers
ists financial goals r
customers (c) Reduces marketing costs d) Limits product availability
<) It describes the company's
(c)Itdefines employees benefits ” ae
building
Question No.31: The transaction is: Question No.32: Select the method that increases vi
(a) Gossip (b) Dispute (agreement (4) Confusion
marketing.
(a) Search Engine Operation
(c) Social Engagement
Optimization
@ Search Engine Optimization
(d) Systematic EngineWrite any five good habits for writing an e-mail.
1. Use the clear, professional subject line
2. Proofread every email you send
3. Write your E-mail before entering recipient address.
4. Double check you have the correct recipient.
5. Ensure you CC all relevant recipients.
6. You don't always have to "reply a
7. Reply to your E-mails.
8. Include a signature block.
9. Use the appropriate level of formality.
10, keep E-mails brief and to the point‘Differentiate between 30 and holographic imaging,
> Ahi tbe fina 3D
3D imaging:
Dinca este the process of capturing and analyzing data from three-dimensional dimensions, enabling detailed representations of surfaces
oped
Holographic imaging is a special way of creating a 3D picture, like a photograph, where you can see an object from all sides as if it's right in front of
/Ou, just by looking at a flat surface, using light waves that are captured and then played back to create the image, kind of like a very detailed
shadow that looks real.Differentiate between 3D and holographic imaging.
> tte SS 3D
3D imaging:
3D imaging refers to the process of capturing and analyzing data from three-dimensional dimensions, enabling detailed representations of surfaces
and volumes.
holographic Imaging:
Holographic imaging is a special way of creating a 3D picture, like a photograph, where you can see an object from all sides as if it's right in front of
you, just by looking at a flat surface, using light waves that are captured and then played back to create the image, kind of like a very detailed
shadow that looks real.‘e-mail, and name any three popular platforms used for sending and receiving e-mail.
PAL pres IP ELLE Sra K Sung Sa PSE
Common platforms used for E-mail:
1. Gmail
2. Microsoft outlook
3. Zoho
4. AOL
5. Yahoo Mail
6. Proton Mail
7. Any other E-mail service provider name may also be awarded marks.SST
Defina necttiooedia presentation, Wythe tha Tings te add a anew slide in MS PowerPoint.
ald PLES SELLE LIL MS Power wee ww BASH assed
Definition of Multimedia Presentation:
A multimedia presentation consists of a set of media objects, such as images, text objects, video clips, and audio streams.
Steps to create new slide in MS Powerpoint:
1. On the home tab, click New Slide
2. In the New slide dialog box, select the layout that you want for your new slide.
3. Select Add Slide.Draw a flowchart to add two numbers and print the sum
Lert tid ELS wyarkby
a2}
LGA»What methods can we use to measure the efficiency of a solution?
et eee
Leb IAS ders 6
«
There can be more than one solution for one problem and one solution can be more effiecient than others.
Efficiency of a solution is measured by following parameters:
© No of steps executed by the solution to solve the problem
* Memory consumed by the solution.
AM) Adnan Manzoor juss) @
2
a
\eConvert the decimal number (156) +. into its binary number
ALE EA SAL MA sesieew
9
Correctly stating the initial decimal number (156) :9.
: Clearly demonstrating the step-by-step division-by-2 method, showing all divisions and remainders.
Correctly identifying the order of the binary digits in the final binary result.Explain the concept and importance of movement in scratch programming.
hortalesiI S72 tb SEF
—
Concept:
Movement is the most basic function in any game. It's the first thing you do when you start a new game, and it's present in almost every game
made in Scratch.
Importance:
In real life, movement is the only way that we can interact with the world. just by thinking about it. we move our arms and legs to walk or do
anything that we want. Just like in real life movement is the primary way that we interact with games.2) Define digital media bias and write its three types. (Marks 05)
ae Bit S/o 7S
Defination:
Media bias occurs when a news outlet allows opinions to affect tt
messaging in mass media.
ws they report. Media criticsm is the ac
examining and analyzing the
Types of M
Slant Bias
Spin Bias
Sensationalism Bias
Story choice Bias
rd choice Bias
© Omission BiasWrite any five key points of the business plan.
Keypoints of business plan:
© Executive summary
* Competitor Analysis
« business description and structure
* market reseach and strategies
* Management and personnelwt ols A
Aatficilinteligence (Ais is the simulation of human intelligence in machines that are programmed to think and act like humans. Learning,
ee ete ioe Toe examples of cognitive abilities. Artificial intelligence refers to
technologies that make devices act and think like aauriativewsssctémel: sof ewer le Ul
Uses of E-mail: y
Itis easy to use and can be accessed easily. |
Can share information easily. z
We can send messages at any time. >
Can connect to people all over the world by sitting at your ieee
Can work with others. Communication can be done with many people at the same time.Write five common platforms of e-mail. (Marks
ea (Sat LELE KE UI
Common Platforms for Elecronic mail:Gmail
* Microsoft Outlook ~
* Yahoo Mail a rm 7
* AOL ~ (CS)
* Zoho . ee
* ProtonMail
* com_Draw the symbols of the flowchart.
SymbolsDraw a flowchart to find even and odd numbers.
bird Li SA fr swt Gb sterConvert the decimal number 172 into binary.iS aha Ppt
ee
Presenting other's work or ideas as your own, with or without consent is called plagiarism. This covers all published and unpublished material
whether in electronic or in printed form. Plagiarism is academic dishonesty and a disciplinary offence.
‘Types of plagiarism There are various types of plagiarism some of them are:Write five techniques of digital marketing.
gg k=l
4, Content Marketing:
5. Video marketing:
6. Web advertising:
7. Affiliate advertising:a). Define emerging technologies and describe their applications. (Marks 05) .
Hoap/ernd iam a) Sanebns
Emerging technologies are new or developing technologies that have the potential to significantly impact society and the economy. They can
include a wide range of fields.
Examples: Such as artificial intelligence, robotics, virtual reality, and the Internet of Things (loT). (3 Marks)
(b) (i) radical novelty (ii) relatively fast growth (iii) coherence (iv) prominent impact (2 Marks)Differentiate between Al and robotics. (Marks 05)
“
Robotics focuses on the manipulation of the physical area, while Al is oriented towards the internal or digital part.
(b)1.5 Marks for each use (Marks 3)
Self-driving cars:cars that capable of sensing its envirnmentand moving safely with little or no human input.
3D printing:A process that creats a three dimensional physical object from a digital designEnlist any five uses of e-mail.
The following are the uses of an electronic mai
1. Communicate with people all over the world for free.
2. Connect with more than one person at a time by sending group mails.
3. Document interactions
4. Wor!
5. Can send attachments
collaboration
6. Can keep a conversation together for multiple people
7. Rating calendars and appointmentsDefine the keyboard and write its three components.