Details
Academic Year 2025-26 Date
Name of student Grade 10
Subject Computer Science
Topic Software & The internet and its uses
Maximum Marks 25
1. Jimmy switches on his desktop computer to complete a school project using a
word processor. As the computer starts up, several processes happen before he
can begin typing his document. First, the computer checks if all hardware
components are working. Then, the main software that manages the computer
loads. After Jimmy logs in, he opens the word processor to start working.
Here are the actions that take place (in jumbled order):
A. The operating system loads into memory
B. The BIOS performs hardware checks (POST)
C. The word processor (application software) is opened by the user
D. The bootloader loads the operating system from storage
E. The user logs into the system
Task:
Arrange the steps in the correct order as they happen during the startup process.
Write only the letters in correct order: [2X1=2]
Working Space:
B→D→A→E→C
1
2. Amira and Jason are both learning programming. Amira writes a Python program
to calculate student grades. When she runs it, the program stops and shows an
error message at line 4. She fixes the error and runs it again.
Jason, on the other hand, writes a C++ program for the same task. When he clicks
"Run", the entire program is first converted into machine code. Only after that does
it run — but if there are any errors, the program won't start until he fixes all of
them.
Based on the scenario above, answer the following: [3X2=6]
a) Describe the differences between the way Amira’s and Jason’s programs are
executed.
b) Give one advantage and one disadvantage of using an interpreter.
c) Give one advantage and one disadvantage of using a compiler.
Working Space:
a)
Amira's program uses an interpreter, which executes the code line by line and stops
when it finds an error.
Jason's program uses a compiler, which translates the entire code into machine
language before execution, and only runs if there are no errors.
b)
Advantage: It is easier to debug since errors are shown immediately during
execution, line by line.
Disadvantage: The program runs slower because it needs to be translated each time
it runs.
c)
Advantage: The compiled program runs faster once errors are fixed because it is
already in machine code.
Disadvantage: Errors are only shown after the whole program is compiled, making it
harder to debug.
2
3. Read the statements below carefully and decide whether each statement is True
or False. [ 8 X 0.5 = 4 ]
a) Defragmentation software helps organize files on a disk to improve access speed.
True
b) File compression utilities increase the file size to save space.
False
c) Virus checkers are only useful if run once a month.
False
d) Security utilities are part of system software and help protect data from
unauthorized access.
True
e) Hacking is always done with criminal intent. False
f) Encryption can help protect against data interception. True
g) Technical skills are always required to carry out social engineering. False
h) All malware types replicate themselves like viruses. False
3
4. Imagine a luxury watch company that wants to ensure the authenticity and
transparency of its products as they move through a global supply chain from
raw materials to the final customer. They implement a blockchain system to
track every step.
Based on the scenario above, answer the following: [2X2=4]
a) Explain how blockchain technology works and what are the three main
components of a block.
b) How it is almost impossible to hack into the blockchain.
Working Space:
a)
A blockchain is essentially a chain of blocks, where each block contains a list of
transactions. These blocks are linked together in a chronological order, forming a
chain. Each block has three main components:
• Data: The transactions or information being recorded.
• Hash Value: A unique identifier (like a digital fingerprint) for the block. It
ensures that the block cannot be tampered with.
• Previous Hash Value: This links the current block to the previous one,
ensuring that the blocks are connected in a specific order.
b)
Blockchain is highly secure due to its decentralized nature, cryptographic foundations,
consensus mechanisms, and immutability. The fact that every transaction is publicly
visible and verified by a distributed network of participants makes it incredibly difficult
to tamper with.
To hack into a blockchain, an attacker would need to to attack every single block in
the chain at the same time, It only takes one block to break the link for any transaction
to be terminated.
5. Sarah is an employee at a financial services company. One morning, she receives
an email that appears to be from her manager, asking her to urgently click a link
and update client information. The email looks convincing but has a slightly
4
misspelled sender address. Meanwhile, her company is also experiencing
unusually slow internet speeds due to high traffic, and she recently received a
pop-up offering free antivirus software from an unknown website.
Identify at least two security threats Sarah might be facing in this situation. For
each threat, suggest one prevention method she or her company should follow
to stay safe. [2X2=4]
Working Space:
1. Phishing Email
• Threat: The email is likely a phishing attempt to steal login credentials or
sensitive data.
• Prevention: Verify the sender's email address, avoid clicking unknown links,
and report suspicious emails to IT.
2. DDoS Attack
• Threat: The slow internet may be due to a Distributed Denial of Service
(DDoS) attack.
• Prevention: Use firewalls and network monitoring tools to detect and mitigate
DDoS attempts.
3. Malware Installation
• Threat: The pop-up offering free antivirus may install malware or ransomware.
• Prevention: Never download software from unverified sources; use trusted
security software and keep it updated.
5
6. Complete the paragraph using the list of given terms. [5X1=5]
• auto-completion
• debugger
• auto-correction
• code editor
• translator
An Integrated Development Environment (IDE) includes many tools to help
programmers write and test code efficiently. It contains a code editor (1) where
the code is written and edited. A translator (2) is built-in to translate the code
into machine language. The IDE also provides a debugger (3) that runs the
program and helps find errors while it executes. To assist with writing code faster,
features like auto-completion (4) and auto-correction (5) suggest or correct
code automatically.