67% found this document useful (3 votes)
10K views

Byte Code 8 Answer Key

Uploaded by

xebas59073
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
67% found this document useful (3 votes)
10K views

Byte Code 8 Answer Key

Uploaded by

xebas59073
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

ps Byte Code

CLASS - 8
Ki

© Kips Learning Pvt. Ltd 2024


Chapter 1: Networking Concepts
A. Fill in the blanks.
1. PAN
2. Data, Resources
3. Single Point
4. Nodes
5. Wireless
B. State True or False.
1. False
2. True
3. True
4. True
5. False
C. Select the correct option.
1. c. Ethernet Network Card
2. a. Inconsistency
3. b. Security
4. a. Ring ps
5. c. Bus Topology
D. Competency-based questions.
1. Hemant should use Local Area Network.
2. Bus topology is suitable.
E. Answer the following questions.
1. A computer network can be defined as a group of computers and other peripheral devices that
are linked together for the purpose of sharing data and hardware resources. Networking in
Ki
computers brings efficiency, economy, and effectiveness in an organisation.
2. The components required for wireless networking are:
• Wireless Network Cards
• Access Points or Routers
3. Two advantages of star topology are:
• It is easy to add a new device to the network as only one cable is required and the
configuration is simple.
• This topology is robust; if a connection in the network fails, the other connections
remain intact.
4. Two or more computers and peripheral devices are connected within a small area, such as
a room, an office building, or campus is called LAN. Whereas, two or more computers are
connected located at distant places is called WAN.
5. The hub broadcasts a request to all the other computers in the network. Whereas, a switch
does not broadcast the message on the entire network. It transmits the message from the
source computer to the destination computer only by using the physical address.

© Kips Learning Pvt. Ltd 2024


Chapter 2: Cyber Ethics
A. Fill in the blanks.
1. Cyber Ethics
2. Citation
3. Cyberbullying
4. Hacking
B. State True or False.
1. True
2. True
3. True
4. False
C. Select the correct option.
1. a. Spam
2. a. Softlifting
3. a. Copyright
4. b. Encryption

ps
D. Answer the following questions.
1. Two safety measures that we should follow while using the internet are:
• To minimise the chances of being attacked by hackers and crackers, one should use
strong passwords.
• Ignore unwanted and strange emails and be cautious of the attachments, links, and
forms in emails that come from unknown people.
2. Spamming refers to unwanted bulk emails that come from unknown sources. Two ways to
prevent spamming are:
• Install spam filtering/blocking software.
Ki
• If you suspect that an email is spam, do not respond.
3. A digital footprint is an impression or information about a person that exists on the internet
because of his online activity. This is the information transmitted online via filling a
registration form, email attachments, online shopping, commenting on a social networking
site, uploading videos, digital images, etc. Two types of digital footprints are active and
passive.
4. To prevent software piracy, follow the given points:
• Buy the licenced copy of the software.
• Purchase software CDs from a reputed seller to ensure that they are genuine.
• If a software is available online, download it directly from the manufacturer's website.
• Register your software to avoid softlifting.

Chapter 3: Emerging Trends


A. Fill in the blanks.
1. Bandwidth
2. Expert System

© Kips Learning Pvt. Ltd 2024


3. Edge Computing
4. Bitcoin
5. Heuristic
B. State True or False.
1. True
2. False
3. False
4. True
5. False
C. Select the correct option.
1. b. Latency
2. a. Big Data
3. c. Knowledge Base
4. a. Blocks
5. b. Less Hardware Requirement
D. Competency-based question.

ps
Company X can consider implementing Edge Computing.
E. Answer the following questions.
1. Extended Reality (XR) is the umbrella term for the immersive technologies, like augmented
reality, virtual reality, and mixed reality. XR is a combination of human and computer-
generated environment, which is real as well as virtual.
2. Blockchain is a distributed database that is shared among the nodes of a computer
network. It stores information electronically in a digital format. Blockchain can be used
in facilitating modern voting system. Using this technology, election fraud can be
eliminated. It can bring more transparency in the electoral process.
Ki
3. The components of an expert system are:
• User Interface
• Inference Engine (Rules of Engine)
• Knowledge Base
4. In a client server network, when a large volume of real time data needs to be collected
for IoT devices, it causes congestion because a huge number of data packets travel
through the same network media.
5. Big Data is a field that makes use of the various mathematical and statistical methods
to extract useful information from a large amount of data. An application of Big data is
Fraud Detection.
Worksheet 1 (Chapters 1 to 3)
A. Fill in the blanks.
1. Hub
2. Active, Passive
3. Decryption

© Kips Learning Pvt. Ltd 2024


4. Blockchain
B. State True or False.
1. True
2. True
3. True
4. True
C. Answer the following questions
1. Network topology refers to the layout in which various components of a network, like
nodes, links, peripherals, etc., are connected and communicated with each other.
2. Two methods to protect intellectual property rights are:
• Patent your Inventions
• Copyright your Art and Publications
3. Augmented Reality is an experience that enhances the reality by adding different objects or
layers to it. The purpose of augmented reality is to create 3D objects or layers that are
computer generated, which merge with the real-world environment.
4. Expert system is a part of Artificial Intelligence, which extracts knowledge from the

1. Expression
2. '+'
3. Iterative
4. Conditional
ps
knowledge base using facts and heuristic.

A. Fill in the blanks.


Chapter 4: Iterative Statements in Python

B. State True or False.


Ki
1. False
2. True
3. True
4. True
C. Select the correct option.
1. a. Looping
2. b. for
3. a. Body
4. c. in
D. Competency-based question.
Arif's father can use an if…else statement.
E. Answer in one word.
1. Infinite
2. ‘for’ loop and ‘while’ loop.
3. ‘in’ and ‘not in’.
4. range() function.

© Kips Learning Pvt. Ltd 2024


F. Answer the following questions.
1. Boolean operators are used to combine two or more conditional statements. They provide
the result in the form of True or False. They are of three types – and, or, and not. For
example, 10>5 and 6<8 returns True as both the conditions evaluate to true.
2. The statements that keep on repeating themselves as long as a given condition is true are
called iterative statements or repetitive statements. For example, to print numbers from 1
to 10 using iterative statement is:
i = 1
for i in range(11):
print(i)
3. The 'for' loop is used when we have to repeat a task a specified number of times or within
a given range. Whereas, the while loop can be applied to a program where the number of
iterations is not known beforehand.
4. Membership operators play an important role in controlling the working of a loop. There
are two membership operators, i.e., in and not in.
5. An infinite loop (or endless loop) is a sequence of instructions in a computer program,
which loops endlessly. It happens either due to the loop having no terminating condition or

1. List
2. Unordered
3. Reversed
4. Tables
ps
the condition that can never be met.

A. Fill in the blanks.

B. State True or False.


Chapter 5: More on HTML5

1. False
Ki
2. False
3. True
4. False
C. Select the correct option.
1. a. Bulleted list
2. b. 1
3. a. List-style-position
4. b. <DD>
D. Competency-based question.
Manas should use border-collapse property and set it to the value collapse. For
example, {border-collapse:collapse}.
E. Answer the following questions.
1. The different types of list supported by HTML are: Ordered list, Unordered list, and
Description list.

© Kips Learning Pvt. Ltd 2024


2. The <ul> tag is used to create unordered List. Items not required to be in a specific
sequence. Whereas, <ol> tag is used to create ordered list. Items need to be displayed in a
specific order.
3. Border property is used to specify the border width, border style, and border colour of the
table and its cells. And, Height and Width properties are used to set the height and width
of the table.
4. A description list consists of a term followed by its definition. It is used to present a
glossary, list of terms, or other name/value lists. It starts and ends with <DL> and </DL>
tag, respectively.

Chapter 6: Links and Frames in HTML


A. Fill in the blanks.
1. Hyperlinking
2. Internal
3. Frames
4. <A>

1. True
2. True
3. True
4. True
ps
B. State True or False.

C. Select the correct option.


1. a. href
2. b. Relative
3. c. Active
Ki
4. b. Video
D. Competency-based question.
To use an image as a link, Vikram can use the <a> (anchor) tag along with the <img> (image) tag
and to add a video clip, he can use the <video> tag.
E. Answer the following questions.
1. Using hyperlinks, one can open any linked web page on the internet in no time. We can use
hyperlinks to:
• Jump from one section to another within the same web page.
• Link to another page within the same website
2. When one part of a web page is linked to another section on the same page, it is called
internal linking. Whereas, when one page is linked to another web page or website, it is
called external linking.
3. Anchor tag <A> is used to mark the text as a hyperlink, which a user can click to display the
document anchored to it. The syntax of <a> tag is:
<A Href = "value"> CLICK HERE </A>

© Kips Learning Pvt. Ltd 2024


4. The <audio> tag is used to add audio and <video> tag is used to add video files. The syntax of
audio and video tags are:
<AUDIO> controls src="File_Path"> Your browser does not support the audio tag. </AUDIO>
<VIDEO> controls src="File_Path"> Your browser does not support the video tag. </VIDEO>
5. Frames are a way of organising your website. They enable the user to divide a page into a
number of rectangular segments for different purposes. They allow multiple HTML
documents to be presented as independent windows within one browser window.
6. <AUDIO controls src="national_song.mp3"> Your browser does not support the audio tag.
</AUDIO>
Chapter 7: Introduction to App Development
A. Fill in the blanks.
1. Hybrid Apps
2. App
3. Social Networking
4. Desktop
5. Banking

1. False
2. True
3. True
4. True
5. True
ps
B. State True or False.

C. Select the correct option.


1. a. Reddit
2. a. MIT App Inventor
Ki
3. c. WhatsApp
4. b. Entertainment
5. c. e-Commerce
D. Competency-based question.
Sneha can use BookMyShow app to book the tickets online.
E. Answer the following questions.
1. Apps can be broadly classified as Desktop apps, Web apps, and Mobile apps. Mobile apps
run on a smartphone or tablet. They have responsive web designs to adapt to the much
smaller screen sizes and orientation of the mobile devices.
2. Web apps are usually browser-based based apps and stored on a remote server. These apps
require an internet connection. Users can access them like any other web page. These
applications can be utilised at whatever point needed from any device through the internet.
For example, Google Maps, Instant messenger, etc.

© Kips Learning Pvt. Ltd 2024


3. Apps that are developed keeping the device specifications in mind are known as native apps.
Most Native Apps come pre-installed on the new phone. Whereas, hybrid apps have the
features of both Web Apps and Native Apps.
4. Desktop apps can be used on a desktop or laptop. They do not need web access and run
independently on a computer. Whereas, web apps require an internet connection. They are
usually browser-based and stored on a remote server.
5. Examples of two entertainment apps are: Disney+Hotstar and Hungama Music. Examples of
two Banking apps are Pockets from ICICI and Yono from SBI banks.

Worksheet 2 (Chapters 4 to 7)
A. Fill in the blanks.
1. Replication (*)
2. Italics <I>
3. External
4. Web
B. State True or False.
1. False
2. True
3. True
4. False
ps
C. Answer the following questions.
1. The statements that keep on repeating themselves as long as a given condition is true are
called iterative statements or repetitive statements.
2. Two table properties are: Border, and Horizontal and Vertical alignment
3. Frames are a way of organising our website. They enable the user to divide a page into a
number of rectangular segments for different purposes. They allow multiple HTML
Ki
documents to be presented as independent windows within one browser window.
4. e-Commerce (electronic commerce) refers to the buying and selling of goods or services
over the internet. Examples of e-Commerce apps are Amazon, Myntra, Flipkart, etc.

Chapter 8: Introduction to Robotics


A. Fill in the blanks.
1. External
2. Sensors
3. Complex-level
4. Actuators
B. State True or False.
1. False
2. False
3. True
4. True

© Kips Learning Pvt. Ltd 2024


C. Match the following.
First industrial robot - Unimate
Washing machine - Simple-level robots
Mitra robot - Launched by the Prime Minister, Narendra Modi
Robot-assisted surgery - Service robots
D. Answer the following questions.
1. Robots are classified into three types: Simple level, middle level and complex level.
2. Fixed robots perform specific repetitive tasks, like painting parts in a car manufacturing
plant, while mobile robots are quite helpful in situations that are not defined in advance
and keep on changing over time.
3. Service robots have improved sensors and they closely interact with humans. They are used
to assist humans in various tasks, like cleaning (vacuum cleaners), transportation (self-driving
cars), defence applications (drones), medical procedures (surgery), etc.
4. Two India's famous robots are:
• Daksh: It is an electrically-powered and remotely-controlled robot. It is used for locating
and destroying harmful objects safely.
• Mitra: It was launched by the Prime Minister, Narendra Modi, and Ivanka Trump at GES

A.
1.
2.
3.
4.
ps
conference 2017.

Fill in the blanks.


Fixed, Mobile
Middle
Computer
Manav
Worksheet 3 (Chapter 8)

B. State True or False.


Ki
1. False
2. True
3. True
4. True
C. Answer the following questions.
1. a. Military robots, like drones, help soldiers in their tough job. When there are bomb
threats, drones are really useful in finding out the various locations of bombs.
b. Industrial robots can manipulate objects in different orientations and even recognise the
various objects that need to be packaged in a different order.
2. Robotics is a branch of engineering and science. It deals with the design, construction,
operation, and use of robots, including the design of computer systems for their control,
sensory feedback, and information processing.

© Kips Learning Pvt. Ltd 2024

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy