0% found this document useful (0 votes)
4 views6 pages

Grade 4 - Revision WS - Final Term

The document is a revision worksheet for a Computer Science subject, consisting of various sections including fill-in-the-blanks, multiple-choice questions, true or false statements, and discussion prompts. It covers topics such as encryption, sensors, software types, and data management. The worksheet is designed to assess students' understanding and knowledge in computer science concepts.

Uploaded by

Uday Hossain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views6 pages

Grade 4 - Revision WS - Final Term

The document is a revision worksheet for a Computer Science subject, consisting of various sections including fill-in-the-blanks, multiple-choice questions, true or false statements, and discussion prompts. It covers topics such as encryption, sensors, software types, and data management. The worksheet is designed to assess students' understanding and knowledge in computer science concepts.

Uploaded by

Uday Hossain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Revision Worksheet

Subject: Computer Science Name:


Total Mark: 30 Grade: 4, Sec:
Mark Obtained: Date: / /
Teacher’s Sign: Parent’s Sign:

(Marks act as a guide only)


Section A
Question 1: Fill in the blanks using the words given in the word bank below. [0.5 × 6 = 3 Marks]

application
hackers record servers software database

system data Count-


sensors intercepting
software controlled

a. Encryption does not prevent someone from a message.


b. manages the operations of the computer and its
resources.
c. A data table is the basic unit of a .
d. A is a collection of fields about the same person or object in a database.
e. Encryption helps to safely exchange data between web and browsers.
f. A loop is repeated a fixed number of times.
g. often steal personal information for financial gain.
h. are special devices that detect changes in the environment.

Question 2: Choose the correct option and circle the corresponding letter: [0.5 × 8 = 4 Marks]
a. A light switches on when someone walks close to your home. Which type of sensor is being
used?

i) Motion
ii) Temperature
iii) Light

b. Encrypt the letter ‘H’ using the Caesar cipher and a key of 3.

i) C
ii) K
iii) E

www.glenrich.edu.bd Page 1 of 6
c.

How many records are in the data table?

i) 4
ii) 6
iii) 5

d. Based on the data table from question c, what is the data type of ‘member of school club’?

i) Text

ii) Number

iii) Yes/No

e. A short audio files created by speaking is called .

i) Image
ii) Movie
iii) Voice note

f. Network failure may prevent students from .

i) Doing homework exercises in their textbooks


ii) Viewing videos stored on their computer
iii) Doing online quizzes

g. Which of the following requires the most amount of storage?

i) A music song
ii) A movie clip
iii) Text

www.glenrich.edu.bd Page 2 of 6
h. Which sensor is used to detect the signal from your car radio remote?

i) Distance
ii) Motion
iii) Infrared

i. Which of the following probably does not have a computer control system?

i) Traffic light
ii) An air- conditioning unit
iii) An outdoor pizza oven

j. Which one is not an example of system software?

i) Windows

ii) Android

iii) Microsoft word

Question 3: State whether the following statements are true or false. [0.5 × 6 = 3 Marks]

a. Text files are made up of only letters.

b. Computer games are an example of application software.

c. An operating system manages the order of a computer’s tasks.

d. A program such as Scratch is a type of system software.

e. Encryption is used to ensure that emails sent over a network are protected from unauthorized
persons.
f. Unencrypted data is called cipher text.

g. A row holds all the data in a single record. ________

h. Network failure does not disrupt services on a network.

i. In a data table numbers can only contain numbers.

www.glenrich.edu.bd Page 3 of 6
Section B

Question 1: Discuss the following: [1 × 2 = 2 Marks]

Infrared Sensor:

Data logger:

Iteration:

Application software:

System software:

Question 2: Is a storage space needed for 20 high quality photographs more or less than for two
pages of a typed document? Give a reason for your answer. [1 × 2 = 2 Marks]

www.glenrich.edu.bd Page 4 of 6
Question 3: What type of output can be produced if you have a distance sensor in your car?
[1 × 2 = 2 Marks]

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

Question 4: Discuss the control system of a refrigerator. What are the inputs? What is processed?
What are the outputs? [1 × 3 = 3 Marks]

Question 5: Encrypt the following statement using the Pigpen cipher. You may use the blank paper
provided on the last page for rough work. [3 Marks]

a. Fly high in the sky:

b. Hide the gem:

www.glenrich.edu.bd Page 5 of 6
Question 6: Decrypt the following message using the Caesar cipher and a key of 3:
[1 × 3 = 3 Marks]

Ciphertex L j r w d q h z s h w
t
Plain
Text

Question 7: Encrypt the following message using the Caesar cipher and a key of 5:
[1 × 3 = 3 Marks]

Plain text: See you tonight

Cipher text:

Question 8: Give two examples of how network failure may affect a retail business like a
supermarket. [1 × 2 = 2 Marks]

www.glenrich.edu.bd Page 6 of 6

You might also like