Year 8 End-of-year Computing Exam 2018 (MCQs)
starstarstarstarstarstarstarstarstarstar
by Isaac Dunn
| 36 Questions
1
1 pt
Which of the above logos is more suitable for a group of elderly people?
Get Connected
Homeward Bound
2
1 pt
What makes an effective logo? Select the most important option.
Complex
Easy to draw
Easy to recognise and remember
Bright and colourful
Full of original ideas
3
1 pt
Sara's privacy settings mean that anyone can view a photo of her in school uniform.
What is the biggest risk with this?
Someone could work out her location
Someone could work out her age
She might find it more difficult to get a job in the future
She might not like her school uniform
She could become the victim of identity fraud
4
1 pt
‘Henry’s Honey’ is a premium British company that pride themselves on producing luxury, organic honey; it’s the best quality stuff on the market today. The company is really keen on keeping their label clean and modern, with a ‘less-is-more’ approach; only include essential elements.
Which of the above logos is the most effective design for Henry's Honey?
A
B
C
D
5
1 pt
What is the best explanation of why it is important to plan a graphic design or a game before you start creating it?
When you create something and submit it to a client, it is important that you give them your planning documents as well as the final product. They may be unhappy if you do not, regardless of how good the final product is.
If you plan your design, you are less likely to run into problems such as forgetting to save, being unsure how to use the software and copyright issues when you begin creating it.
Planning lets you think through the design carefully before working out how to use the software to create it. It allows you to make adjustments based on feedback easily.
The next few questions will be about this labelled image of the drawing toolbar from Serif DrawPlus X6.
6
1 pt
Which is the best description of the tool labelled "2" in the image above?
Used to select and stretch objects
Used to draw freehand lines
Used to draw smooth curves between selected points
Used to create areas with different textures
Used to create new layers in the drawing
7
1 pt
Which is the best description of the tool labelled "6" in the image above?
Used to draw shapes
Used to create text boxes
Used to convert objects into 3d
Used to animate objects
Used to shade different parts of an object in different colours or shades
8
1 pt
You have just used the shape tool (labelled "4") to create a rectangle using Serif DrawPlus. If you want to colour it in a solid blue colour, which tool would be best to click on next (from the following options)?
The tool labelled "1"
The tool labelled "2"
The tool labelled "3"
The tool labelled "5"
The tool labelled "6"
You notice that one of your friends, Sara, has not protected their social media account, giving anyone access to see what is on their profile. The next few questions will be about Sara.
9
1 pt
Sara's privacy settings mean that anyone can view a photo of her doing something illegal.
What is the biggest risk with this?
Someone could work out her location
Someone could work out her age
She might find it more difficult to get a job in the future
She could become the victim of identity fraud
There are no risks, because she can simply delete the photo
10
1 pt
Sara's privacy settings mean that anyone can see a photo of the information in her passport which she posted when she was going on holiday last year.
What is the biggest risk with this?
Someone could work out her location
Someone could work out her age
She might find it more difficult to get a job in the future
She could become the victim of identity fraud
There are no risks, because she can simply delete the photo
11
1 pt
Sara's privacy settings mean that anyone can message her. She has been talking to Rob, who is one year older and lives in a nearby city. Sara has been talking to Rob for 2 months.
What is the most serious risk with this?
Rob might not want to carry on talking to Sara
Rob might not be who he says he is
Sara might spend too much time talking to Rob
Sara may get bored with Rob and not want to carry on talking to him
12
1 pt
Which of the following passwords is least secure? (1 mark)
jellyfish-shuttle-crime-solidarity
1c3~cReAm!
mrdunn123456789
13
1 pt
Sara says that she is meeting Rob at the weekend. Tick every piece of advice you would give to Sara.
Meet in a public place
Wear a disguise so Rob doesn't know what you really look like
Have an adult you trust watching nearby
As long as you have video called before you meet, it should be fine

14
1 pt
It is a good idea to use personal information (for example, the name of a pet) when creating a password, because it will help you to remember it.
True
False
15
1 pt
If you create a password by joining together random words, or random letters/numbers, it will be secure.
True
False
16
1 pt
You have just got a new phone for your birthday and you want to put some music on it to play when you don't have an Internet connection. However, you cannot afford to buy albums. Your friend tells you about a website she knows which allows you to download any music for free.
Which of the following would probably not be a problem with using this website?
The website may try to infect your computer with malware
Downloading most music without paying for it is against the law
A future employer will see that you have used this website, and may not give you a job
17
1 pt
When checking your email, you find you have a new message from a website you don't recognise stating that you have bought a TV for £799, which will be taken from your account tomorrow. You know that you haven't ordered such a TV. There is a link button in the email to a website to cancel the order. The button says "Cancel Order Now" on it in large writing.
Out of the following, which is the best option?
The email is probably an example of phishing, so it should be deleted or marked as spam.
The email is probably legitimate, so the link should be clicked on.
The email may be legitimate, so you should reply to the email explaining you want to cancel the order.
18
1 pt
In the image above, which sprite is at co-ordinates (-200, -100)?
The cat
The crab
The woman
The wizard
The bat
The pencil
19
1 pt
Which of the above statements is incorrect?
A
B
C
D
20
1 pt
Each time the "move 10 steps" block is reached, which direction is the sprite facing?
Towards the mouse pointer
Directly away from the mouse pointer
A random direction
The bottom of the screen
The left of the screen
21
1 pt
Above is an image of a micro:bit. Select each feature that a micro:bit has.
Processor
Compass
Fingerprint sensor
Programmable LEDs
Programmable buttons
Micro USB connection
Tilt sensor
22
1 pt
When will the program above make a heart pattern appear on its LEDs?
Always
Sometimes - it depends on chance
Sometimes - it depends on what the user does
Never
23
1 pt
What is the best description of what the above program is supposed to do?
When heads or tails is tossed, the micro:bit shakes or vibrates.
When the micro:bit is shaken, it randomly shows either "Heads" or "Tails" on its LEDs.
Depending on whether heads or tails is tossed, it randomly either shakes or does not shake the micro:bit.
When the micro:bit is shaken, it swaps between showing "Heads" or "Tails" on its LEDs .
The first time the micro:bit is shaken, it shows "Heads" on its LEDs; after the first time, it shows "Tails".
24
1 pt
The program above does not actually work as intended. How should this be fixed?
Instead of "show string", it should have "show LEDs" and have the right patterns selected with ticks.
Instead of "pick random 0 to 2", it should say "pick random 0 to 3".
Instead of "pick random 0 to 2", it should say "pick random 0 to 1".
Instead of "if toss = 0", it should say "if toss = 2".
"Heads" and "Tails" should be the other way around.
Instead of "on shake", it should say "when button A pressed".
25
1 pt
Which of the following statements about sexting is incorrect?
A sext is a message with sexual content.
Once a sext is sent, it is entirely out of your control.
If someone sends you a sext, sharing it is a serious crime.
Most people between the ages of 13 and 18 send sexts.
One reason that someone might send a sext is because they feel pressure to show that they are attracted to someone.
26
1 pt
Think about what computers can and cannot do.

Which of the following can a computer not do? There is only one correct answer.
Play chess better than any human
Drive a car more safely than most humans
Understand and create poetry
Send messages to the other side of the world in under one second
27
1 pt
Out of this list, select all the output devices.
Keyboard
Mouse
Monitor
Projector
Microphone
Speaker
28
1 pt
Select all of the hardware from the following list.
Microsoft Windows
Speakers
A CPU
A USB memory stick
Serif DrawPlus X6
A digital photograph
29
1 pt
A computer does not have any intelligence or common sense without being given instructions; all it can do well is blindly follow commands given by a human.
True
False
30
1 pt
How often should you save your work? Pick the best answer.
After every single change you make
Often enough that if your computer crashed, you wouldn't be annoyed
Every time you close a file
Every 15 minutes
Every hour
31
1 pt
When you are saving your files, which of the following is most important?
File names should include letters, numbers and special characters
File names should always end in a number
File names should always indicate what the file contains
File names should include both upper and lower case letters
32
1 pt
Which of the following is an example of an input device?
A controller for a games console
A pair of wireless earphones
An LED to show if the computer is working
A printer
33
1 pt
An algorithm is a set of instructions to achieve a goal.
True
False
34
1 pt
What is a virus?
Something that increases the speed of your computer
Software that spreads between computers, causing harm
Software that destroys your hardware
Hardware that destroys your software
35
1 pt
Which statement is incorrect?
Scratch is a programming language
Without a program, a computer would not be able to do anything
If you make a mistake when programming, computers can almost always find the problem
You control a micro:bit using a programming language
There might be more than one way of programming a computer to do something
A micro:bit is a type of computer
36
1 pt
The beavers and dogs had a competition. In total nine animals took part.
The nine participants had the following scores: 1, 2, 2, 3, 4, 5, 5, 6, 7.
No dog scored more than any beaver.
One dog tied with a beaver.
There were also two other dogs that tied with each other.
How many dogs took part in the competition?
2
3
4
5
6
7
8
9
Add to my formatives list