0% found this document useful (0 votes)
325 views

InspireComputing Y8 WB Answers

Uploaded by

molaposk10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
325 views

InspireComputing Y8 WB Answers

Uploaded by

molaposk10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Vector graphics [U1_L1]

Question Answer Notes


1 • TICK KEYWORDS
2 Include any three of the following:
• A starting point
• An end point
• The type of line
• Any curves or angles
• Line and fill colours.
3 Include any three of the following:
• Ability to be scaled without losing quality.
• Small file size
• Easily edited
• Ideally suited for geometric shapes.
4 Include any two of the following:
• 2D and 3D animation
• Gaming
• Advertising.
5

6
End: X8, Y3
Fill colour: grey
7 2

Question Answer Notes / Marks


8_Q1 Dot to dot
8_Q2 False
8_Q3 Resolution
8_Q4 Scaling
8_Q5 Coordinates

1 Inspire Computing Workbook Year 8


Creating a vector graphic [U1_L2]

Question Answer Notes


1 • TICK KEYWORDS
2 • A vector graphic can be plotted using a series of
coordinates in a similar style to a dot-to-dot image.
3

4 Shape 2:
X1,Y5 X1,Y6 X9,Y6 X9,Y5

Question Answer Notes / Marks


6_Q1 Radius
6_Q2 Scratch
6_Q3 False
6_Q4 Centre
6_Q5 Plotter

2 Inspire Computing Workbook Year 8


Bitmaps [U1_L3]

Question Answer Notes


1 • TICK KEYWORDS
2 • A bitmap is an image file made up of dots, or pixels.
3 • A bitmap is an image file made up of dots or pixels. Each
pixel can be a different colour and the more pixels, the
more detailed the image.
4 • Pixel = Short for picture elements
• Resolution = Relates to the number of pixels within an
image
• Gradient = Describes the change from one colour to
another

5 • The higher the number of pixels, the higher the quality of


the image or photo.

6 • Increasing the physical size of any bitmap will reduce the


resolution, lowering the quality of the image.
7 Include three of any of the following:
• BMP, JPG, GIF, TIFF, PNG, PICT

Question Answer Notes / Marks


8_Q1 Camera
8_Q2 DXF
8_Q3 Gradient
8_Q4 Pixels per inch
8_Q5 8K

3 Inspire Computing Workbook Year 8


Vectors vs Bitmaps [U1_L4]

Question Answer Notes


1 • TICK KEYWORDS
2 Include any three of the following:
• File size
• Quality of image
• Scaling
• Use of colour.
3
Statement Bitmap Vector

Generally smaller file sizes. 

Can be resized without losing quality. 

More suitable for high quality digital photos. 

Difficult to create gradients. 

Image quality will drop if stretched. 

4 Include any of the following:


• Vectors:
o Illustrator
o Inkscape
o Vectr
• Bitmaps:
o Photoshop
o GIMP
o Paint.net
5
Scenario Bitmap Vector

Creating a new sports logo that incorporates lots of 


geometric shapes.

An outdoor adventure magazine is showing images of 


mountain ranges.
A new computer operating system would like a background 
of flowing liquids and colour effects.

A new children’s cartoon character, made from simple 


lines, will need to be advertised on posters of many
different sizes.

6 • Examples should meet the criteria specified in this and


earlier sections.

Question Answer Notes / Marks


7_Q1 Moviemaker
7_Q2 True
7_Q3 Dots per inch
7_Q4 300 dpi
7_Q5 Converting a vector to a bitmap.

4 Inspire Computing Workbook Year 8


Binary and pixels [U1_L5]

Question Answer Notes


1 • TICK KEYWORDS
2 • All computer data must be converted to binary in order to
be understood.
3 1 0 0 1
0 0 1 0
0 1 0 0
1 0 0 1

4 • A collection of 1s and 0s groups together for a purpose.


5 • 1001001001001001
6

0 1 1 1 1 1 1 1 1 1 1 0
0 0 0 0 0 1 1 0 0 0 0 0
0 1 1 1 1 1 1 1 1 1 1 0
0 1 0 0 0 0 0 0 0 0 1 0
0 1 0 1 1 0 0 1 1 0 1 0
0 1 0 1 1 0 0 1 1 0 1 0
0 1 0 0 0 0 0 0 0 0 1 0
0 1 0 1 0 0 0 0 1 0 1 0
0 1 0 1 1 1 1 1 1 0 1 0
0 1 0 0 0 0 0 0 0 0 1 0
0 1 1 1 1 1 1 1 1 1 1 0
0 0 0 0 0 0 0 0 0 0 0 0

Question Answer Notes / Marks


7_Q1 Cannot be resized
7_Q2 True
7_Q3 All of the above.
7_Q4 False
7_Q5 1-bit

5 Inspire Computing Workbook Year 8


Colour depth and binary representation [U1_L6]

Question Answer Notes


1 • TICK KEYWORDS
2 • Colour depth is the number of colours an image can
contain, represented by the number of bits per pixel.
3 • The greater the number of bits, the more colours can be
shown in that individual pixel.
4
Number of bits per Number of possible
pixel colours
1 2
2 4
3 8
4 16
5 32
6 64
7 128
8 256
5
Binary Colour
0 0 White
0 1 Light grey
1 0 Dark grey
1 1 Black

6
01 11 11 11 11 11
01 01 01 01 01 11
01 11 11 11 11 11

01 11 00 00 00 00

01 11 00 10 10 00

01 11 00 10 10 00

7 • It gets much longer.

Question Answer Notes / Marks


8_Q1 four
8_Q2 True
8_Q3 512
8_Q4 24-bit
8_Q5 True

6 Inspire Computing Workbook Year 8


Digital image properties [U1_L7 & 8]

Question Answer Notes


1 • TICK KEYWORDS
2 • Pixel size = Number of pixels in total in the image.
• Dimension = Height and width in pixels.
• Resolution = Number of pixels in one square inch.
• Colour depth = The number of colours each pixel can
show.
3 • File size = Pixels × Colour depth
4 • 36 × 2 = 72 bits
5 • 42 × 1 = 42 bits
6 • 144 × 2 = 288
7 • The larger the number of pixels, the larger the file size.

Question Answer Notes / Marks


8_Q1 120
8_Q2 24
8_Q3 Inch
8_Q4 Bits
8_Q5 False

7 Inspire Computing Workbook Year 8


Binary addition [U1_L9 & 10]

Question Answer Notes


1 • TICK KEYWORDS
2 • Rule one: 0 + 0 = 0
• Rule two: 1 + 0 = 1
• Rule three: 1 + 1 = 10 (binary for 2)
• Rule four: 1 + 1 + 1 = 11 (binary for 3)
3 1011
0101
10000
1111
4 01011011
00101101
10001000
111111
5 • If an 8-bit binary addition exceeds 255, the sum cannot be
carried out.
6 • Red = 110000
• Green = 001100

110000
001100
111100 = Yellow

7 • Blue = 000011
• Red = 110000

000011
110000
110011 = Magenta

Question Answer Notes / Marks


8_Q1 2
8_Q2 1
8_Q3 256
8_Q4 16
8_Q5 False

8 Inspire Computing Workbook Year 8


End of Unit Typical 4 Mark Questions

Question Key points to look for in answer Notes


1 • As the logo needs to include a photo, it should be created using bitmap
software.
• Reasons:
o Bitmap is much better for photos.
o Can produce much higher resolution.
o High resolution
o Commercial resolution of 300dpi can be created in bitmaps.

2 • 20 × 10 = 200
• 200 × 3 = 600
• File size = 600 bits

9 Inspire Computing Workbook Year 8


Bits, Bytes and Nibbles [U2_L1]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● To store computer information or be able to read and write
to storage media.
3 ● Internal hard drive = Non-removable storage inside a computer
● Flash drive = Used to transport files from one computer to another
● Memory cards = Used to add storage to smartphones and cameras
● External hard drive = Used to add additional storage to computers

4 ● 1 byte = 8 bits
● 4 bits = 1 nibble
● 2 nibbles = 1 byte
5
Word Bytes Nibbles Bits
cat 3 6 24
bubble 6 12 48
elephant 8 16 64
skateboard 10 20 80

6 ● File size in bytes = (pixels x colour depth)/8


7 ● 10 x 5 = 50
● File size = (50 x 4)/8
● File size = 200/8
● File size = 25 bytes

Question Answer Notes / Marks


8_Q1 False
8_Q2 Memory card
8_Q3 Floppy disc
8_Q4 10
8_Q5 True

10 Inspire Computing Workbook Year 8


Storage capacity [U2_L2]

Question Answer Notes


1 ● TICK KEYWORDS
2 Include any two of the following:
● Digital photos
● Emails
● Documents
● Music and video files

3 ● 1 kibibyte = 1024 bytes


● 1 mebibyte = 1024 kibibytes
● 1 gibibyte = 1024 mebibytes

4 ● 1 kilobyte = 1000 bytes


● 1 megabyte = 1000 kilobytes
● 1 gigabyte = 1000 megabytes
5 ● Base 2 allows the calculation of binary bits
● Base 10 allows the calculation of bytes
6
File bytes kibibytes (KiB)
Text 2048 2
Vector graphic 512 0.5
Spreadsheet 5120 5

7
File kibibytes (KiB) bytes
Image 10 10240
Audio 6 6144
Video 100 102400

Question Answer Notes / Marks


8_Q1 1024
8_Q2 False
8_Q3 International Electrotechnical Commission
8_Q4 True
8_Q5 Yobibyte

11 Inspire Computing Workbook Year 8


Binary and Denary [U2_L3]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Base 2: 0,1
● Base 10: 0,1,2,3,4,5,6,7,8,9

3 ● 106 = Millions
● 104 = Tens of thousands
● 102 = Hundreds
4
Power 106 105 104 103 102 101 100

Millions Hundreds Tens of Thousands Hundreds Tens Ones


of thousands
thousands
1974 0 0 0 1 9 7 4

650456 0 6 5 0 4 5 6

5
Power 27 26 25 24 23 22 21 20

Description 128 64 32 16 8 4 2 1

58 0 0 1 1 1 0 1 0

129 1 0 0 0 0 0 0 1

6 ● 161 = 10100001
● 37 = 100101
● 240 = 11110000

7 ● 01010100 = 84
● 11011011 = 219
● 11100011 = 227

Question Answer Notes / Marks


8_Q1 False
8_Q2 Fingers
8_Q3 64
8_Q4 Switches
8_Q5 Transistors

12 Inspire Computing Workbook Year 8


Creating a ‘power of’ calculator [U2_L4]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Scratch is a visual programming application that uses
blocks to create algorithms.
● It is designed for sharing algorithms with other uses.

3 ● Ask = Asks the user to type in a value


● Say = Displays a message on screen
● Join = Concatenates two strings
4 ● A variable assigns a name to a value or string.
5 ● Line 1: Asks the user to enter the first number and saves it
as an integer.
● Line 2: Asks the user to enter the power and saves it as
an integer.
● Line 3: the ** symbol is the power operator
● Line 1 = 2, line 2 = 4, Output = 16

Question Answer Notes / Marks


6_Q1 True
6_Q2 Forum
6_Q3 Sprites
6_Q4 Naming convention
6_Q5 8

13 Inspire Computing Workbook Year 8


Internet Bandwidth [U2_L5]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● The amount of data than can be sent in one second.
3 ● 3 bytes = 24 bits
● 8 bits = 1 byte
● 2 mebibytes = 2048 kibibytes

4 ● File transfer speed = File size / Bandwidth


5
File Time to download (Seconds)
Bandwidth = 2MiB Bandwidth = 10MiB
8 MiB Email attachment 4 Seconds 0.8 Seconds
10 MiB Audio file 5 Seconds 1 Second
100 MiB Video clip 50 Seconds 10 Seconds

6 ● Bottleneck occurs when too many users are accessing the


same network. It will cause all users to only be able to use
the slowest bandwidth available on the network.
7 ● 5 MiB/s

Question Answer Notes / Marks


8_Q1 Bits per second
8_Q2 False
8_Q3 25
8_Q4 Mebibytes
8_Q5 True

14 Inspire Computing Workbook Year 8


Creating a bandwidth calculator [U2_L6]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● When ‘Flag’ is clicked = Start the program running
● Set = Assign a value to a variable
● Ask and wait = Wait until an input is responded to

3 ● fileSize
● bandwidth
● transferTime
4 ● Being the same means that the file transfer speed will be
calculated in seconds.
● Line 3: / is the divide operator
● Line 1 = 20, Line 2 = 4, Output = The resulting file transfer
speed is 5 seconds

5 ● A test table allows the designer to check the functionality


of a program through a series of tests.

Question Answer Notes / Marks


6_Q1 Seconds
6_Q2 False
6_Q3 Retest
6_Q4 Comma
6_Q5 Actual result

15 Inspire Computing Workbook Year 8


Compression [U2_L7 & 8]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Compression is the reduction of the file size of any type of
computer file.
3 Include any three of the following:
● Attaching documents to emails
● Computer storage
● Transferring files on portable devices
● Speeding up downloads

4 ● Lossy compression deletes part of the file, reducing the


file size, but when the file is decompressed, the deleted
parts cannot be restored. Lossy compression is never
used for text files as characters would be lost, but it is
often used for image and sound files.
5 ● Lossy compression removes data that cannot be restored, lossless compression allows
the original file to be restores exactly as it was.

6
Scenario Lossy Lossless


A customer database of personal details.


A wedding album of photos.


A music album recording in a studio.


Adding an audio clip to a social network site.


A snapshot sent within an instant message app

7 Settings:
● Colour depth
● Resolution
● Image size

Question Answer Notes / Marks


8_Q1 TXT
8_Q2 True
8_Q3 Resolution
8_Q4 False
8_Q5 True

16 Inspire Computing Workbook Year 8


Run Length Encoding [U2_L9 & 10]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Run length encoding is a lossless compression method.

3 Required:
● Image height and width
● Colour depth

4
Original string Size in RLE New size
bytes version in bytes
wbbbbw 6 1w4b1w 6
bbwwbb 6 2b2w2b 6
bbwwbb 6 2b2w2b 6
bbbbbb 6 6b 2
bbwwbb 6 2b2w2b 6
bbwwbb 6 2b2w2b 6
Total file size 36 32

5 ● Your version should follow the rules set in Q4.

Question Answer Notes / Marks


6_Q1 False
6_Q2 6
6_Q3 2
6_Q4 1
6_Q5 True

17 Inspire Computing Workbook Year 8


End of Unit Typical 4 Mark Questions

Question Key points to look for in answer Notes


1 ● Examples of typical storage:
● Photos = typically megabytes
● Videos = typically gigabytes
● Documents = typically megabytes
● Music = typically megabytes
● However, this means a family will need gigabytes or terabytes

2 ● RLE analyses a data string and looks for repeated characters. These
repeated characters can then be compressed.
● The sequence AAAAABBBCCCC would compress to 5A3B4C

18 Inspire Computing Workbook Year 8


Computer hardware [U3_L1]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Hardware is a physical object we can pick up.
● Software is the programs we install on a computer.
3 Include any three of the following:
● Desktop
● Laptop
● Tablet
● Smartphone
● Phablet
● Or any other related device.

4 ● Central processing unit = The brain of the computer, it


carries out all processing.
● Memory = The short-term memory, it stores program data
and the results from calculations.
● Power supply unit= Provides the correct power supply to
all components.
● Hard drive = The main storage device, storing the
operating system.
5 ● The motherboard is the main circuit board that all other devices are connected to.
6
Scenario Video card Hard drive CPU

Playing the latest 3D


computer game.

Carrying out complex


numerical modelling.

Organising family files


and images.

Question Answer Notes / Marks


7_Q1 False
7_Q2 Mouse
7_Q3 Brain
7_Q4 RAM
7_Q5 Raspberry Pi

19 Inspire Computing Workbook Year 8


Wearable technology [U3_L2]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Wearable technology describes any internet connected,
wearable device that is carried or worn on the person
without the need to hold in your hand.

3 Include any three of the following:


● Smartwatch
● Smart jewellery
● Smart glasses
● Smart clothing
● Smart trainers

4 ● AR/VR = replacing everything we see via a headset or adding additional information to


our field of view.
● Fitness tracking = Monitoring location, movement, and the health of the wearer
● Payments = Making contactless payments without the need for cash or a credit card.
● Communication = Messaging and social network notifications.
5 ● Because if the battery doesn’t last a full day, users may
not want to wear it.
6
Statement Benefit Drawback
New technology is often very
expensive.

Video games could be more
interactive.

Our location is being shared
online more often.

Health problems could be
spotted.

7 Include any three of the following:


● Smart lenses
● Health monitors
● Footwear
● T-shirts
● Implanted devices

Question Answer Notes / Marks


8_Q1 Augmented reality
8_Q2 Every day
8_Q3 Text messaging
8_Q4 Headset
8_Q5 True

20 Inspire Computing Workbook Year 8


Logo design [U3_L3]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● A logo is an original graphic that represents a product,
brand or service.
3 Include any two of the following:
● New physical product
● New virtual product
● New game
● New film or tv programme
● New band
● Business
● Political party
● Charity

4 Include any three of the following:


● The name
● A colour scheme
● A choice of fonts
● Suitable imagery or graphics

5 ● Construction = Will the logo be made using bitmaps or


vectors?
● Transferability = Can the logo be easily transferred to
other documents or products?
● Content = What must be included in the design and is
there an existing house style?
● Text or graphic based = Does the full name need to be
included or its initials? Are there images already
associated with the brand

6
Include any two of the following:
● Might be transferred to multiple documents, both physical and online
● Might appear on different devices
● Resizing may require different filetypes

7
Graphic Advantage Disadvantage
Bitmap High quality photos can be used Cannot be made larger without losing
quality
Vector Can be made any size, big or Cannot high quality create photos.
small

Question Answer Notes / Marks


8_Q1 A homework project
8_Q2 False
8_Q3 An address
8_Q4 Bitmap
8_Q5 Vector

21 Inspire Computing Workbook Year 8


Introduction to spreadsheets [U3_L4]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● A spreadsheet is a document that allows the entering of
numerical data into rows and columns that can be
analysed, sorted, or used to complete calculations.
3 Include any three of the following:
● Finance
● School data analysis
● Presenting data
● Recording results

4 Include any three of the following:


● Cell-based layout
● Tables
● Multiple worksheets
● Formulas and functions
● Charts or graphs

5 ● Text = Changing the size, colour, font and style of text


● Border = Changing the lines around the edge of each cell
● Alignment = Text can be aligned to the centre or to a specific corner of a cell
● Cell merging = Cells can be merged together into one
6
Data type Example
Number 1.25
Currency $9.99
Percentage 75%
Date 04/05/1977
Time 07:30:00

7 ● Currency
● Date

Question Answer Notes / Marks


8_Q1 Adobe Acrobat
8_Q2 True
8_Q3 Merge
8_Q4 Worksheet
8_Q5 False

22 Inspire Computing Workbook Year 8


Spreadsheet formulas and functions [U3_L5]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● formulas and functions allow calculations to be carried out
and the modelling of potential scenarios and asking what if
questions about the data.
3
A B C D E
1 C1
2 A2
3 C3 E3
4
5 C5 D5
6 A6

4
Operator Description
+ Add
- Minus
/ Divide
* Multiply
= Equal to

5 ● MAX = Displays the highest value in the range of cells


● MIN = Displays the lowest value in the range of cells
● SUM = Displays the total of all the values in the range of
cells
● AVERAGE = Displays the average value of all the values
in the range of cells
6 D1: 18
D2: 21
D3: 2
D4: 1
E5: 13
E6: 3.25
E7: 1
E8: 6

Question Answer Notes / Marks


7_Q1 False
7_Q2 A range of cells
7_Q3 Horizontally
7_Q4 True
7_Q5 Battleships

23 Inspire Computing Workbook Year 8


Spreadsheet modelling [U3_L6]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● It allows the user to change variables in a spreadsheet to
recreate a real situation or predict the result of a situation
or scenario.
3 Include any two of the following:
● Profit or loss
● Home decorating budget
● Student grade predictions
● Or any other sensible solution.

4
A B C D E
1 Month New members
2 Jan 3
3 Feb 3
4 Mar 4
5 Apr 4
6 May 5
7 Jun 5 Potential total =SUM(B2:B13)
8 Jul 5 Annual target 150
9 Aug 10 Members needed =E8-E7
10 Sep 15 Average =AVERAGE(B2:B13)
11 Oct 10 Lowest =MIN(B2:B13)
12 Nov 25 Highest =MAX(B2:B13)
13 Dec 30

5 ● B9, E7, E9, E10


6 ● The goal seek function will adjust a variable until a desired
outcome is created.

Question Answer Notes / Marks


7_Q1 Money generated
7_Q2 Budget
7_Q3 True
7_Q4 Goal seek
7_Q5 Alignment

24 Inspire Computing Workbook Year 8


Environmental impact of technology [U3_L7]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Material choice = “I never knew this phone had gold in it!”
● Energy use = Mum, I need more plug sockets in my room!”
● Electronic waste = “I can’t believe last year’s model is now updated – I want the new
one!”
3 Include any three of the following:
● gold, silver, copper, palladium, chromium, oil, lead,
cadmium, and mercury.
4 Include any three of the following:
● Charging more and more devices
● Powering homes, satellites, mobile phone communication
towers and infrastructure
5 Include any three of the following:
● Perfectly usable devices are thrown away and not
recycled
● Rare and toxic materials can leak into the ground
● Thrown away electronics end up in landfill sites and
people risk their life to salvage them.
6 Include any two from each column.

Material choices Energy use Electronic waste


● Reduce the need for ● Create more efficient ● Create collection and
rare elements and batteries than need recycling points for
focus on artificial charging less and last damaged devices.
replacements. longer. ● Find new users around
● Recycle the materials ● Focus on renewable the world for unwanted
used to manufacture energy sources such devices.
devices. as solar and wind. ● Improve the
● Reduce the size and ● Produce energy upgradability of
thickness of devices. efficient devices that devices, such as
will hibernate to save adding memory, rather
power when not in than replacing them.
use.

7 ● Unwanted devices are traded in, money given to the


owner to put towards a new device and the old device is
given to a new user or recycled.

Question Answer Notes / Marks


8_Q1 Sand
8_Q2 True
8_Q3 True
8_Q4 Gas
8_Q5 Upgradability

25 Inspire Computing Workbook Year 8


Presenting data in an informative way [U3_L8]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● A chart or graph presents data a visual way that is easy to
read and analyse.

3 ● Pie = Ideal for showing individual parts of a whole or


percentages
● Line = Ideal for showing changing values over time
● Bar/column = Displays the value of a range of similar
items against the same quantity
● Scatter = Displays two sets of data to see if there is a
connection between them
4 ● Chart 1 = Pie
● Chart 2 = Line
● Chart 3 = Scatter
● Chart 4 = Bar/column
5 ● An infographic is a document designed to convey
information in a visually interesting and straightforward
way.
6 Include any three of the following:
● Marketing
● Historical events
● Government leaflets
● Educational material
7 Include any three of the following:
● Text
● Charts or graph
● Diagrams
● Timelines
● House style

Question Answer Notes / Marks


8_Q1 Pie
8_Q2 Bar/column
8_Q3 True
8_Q4 Timelines
8_Q5 True

26 Inspire Computing Workbook Year 8


Surveys and questionnaires [U3_L9]

Question Answer Notes


1 ● TICK KEYWORDS
2 Include any two of the following:
● New product launches
● New government rules
● Evaluating existing products

3 Include any three of the following:


● In person
● Virtually in person, via video or audio link
● Online via a website
● Via text message or app
● As a written document to complete

4 ● Audience = Are you talking to the right people and will


they be interested in the topic?
● Confusion = Are the questions over-complicated and
could they result in poor responses?
● Language = Are any questions written in a clear, simple
way using words suitable for all?
● Sample size = Are the right number of people being
consulted?

5 ● Making sure leading questions are not being used to give


a specific answer or response that suits those collecting
the data.
6
Statement Qualitative Quantitative
Interviews

Yes/No questions

Multiple choice

Group discussions

Observations

Star or number rating

Question Answer Notes / Marks


7_Q1 Interview
7_Q2 The number of people questioned
7_Q3 Leading question
7_Q4 Quantitative data
7_Q5 False

27 Inspire Computing Workbook Year 8


Advanced spreadsheet functions [U3_L10]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● The COUNT function counts the number of values there
are in a range of cells.
3 ● The COUNTIF function is used to count the number of
values in a range of cells that meet a specific criteria.
4 ● D1 = 5
● It doesn't include the title of the list.
5 ● D1 = 1
● =COUNTIF(A2:A6,”Bagel”)
6 Include any three of the following:
● The colours used
● The style of text
● The language used
● The type of chart used, these are discussed earlier in this
section
● The graphical presentation, either 2D or 3D

Question Answer Notes / Marks


7_Q1 COUNTIF
7_Q2 False
7_Q3 Comma
7_Q4 Vertically
7_Q5 False

28 Inspire Computing Workbook Year 8


End of Unit Typical 4 Mark Questions

Question Key points to look for in answer Notes


1 Any two of the following:
● Know the target audience - Your idea needs to appeal to them, what are
their interests?
● Construction - Will the logo be made using bitmaps or vectors? Each
has its advantages and disadvantages as discussed in the Year 8 book.
● Theme - What is the theme of your product or service, is it meant to be
fun, informative, or linked directly to a style?
● Transferability - can the logo be easily transferred to other documents or
products or different sizes and shapes? This also includes electronic
versions: websites, apps, social media pages.
● Content - What must be included in the design and it there an existing
house style?
● Text or graphical based - Does the full name need to be included or its
initials? Are there images already associated with the brand that need to
be included?

2 ● Qualitive data: surveys are questionnaires with open ended questions


o Examples: what is your favourite feature? What is the worst
feature?
● Quantitative data: these are close-ended questions with specific answer
choices, designed to count and analyse afterwards.
o Examples: Rate on a scale of 1-5, Yes or no questions, how
many hours do you spend online?

29 Inspire Computing Workbook Year 8


Social media [U4_L1]

Question Answer Notes


1 ● TICK KEYWORDS
2 Include any three of the following:
● Chatting
● Meeting at events
● Talking to new people with similar interests
● Playing games or watching films
● Sharing photos and videos

3 Include any four of the following:


● Instant messaging
● Blogging
● Media sharing
● Networking
● Gaming

4 ● Profile = Personal information about the user, their interests and hobbies
● Friend requests = Other users wanting to connect to your profile and content
● Followers = Users that are interested in reading all of your posts
● Targeted advertising = Based on your profiles, sponsored content is sent to you and
place on your page
5 ● A blog contains time-stamped entries, like a diary.
● A static site doesn’t really change from day to day.
6
Statement Advantages Disadvantages
Ability to chat with family and friends around the ✓
world.
Many social networks are free to use. ✓
Fake news and biased opinion ✓
Social interaction if living in a remote area. ✓
Cyberbullying. ✓
Lack of privacy and personal information being ✓
shared with other sites and advertisers.

7 ● Cyberbully is the use of any Internet technology to send


rude, mean or unsuitable messages to another person.

Question Answer Notes / Marks


8_Q1 Internet relay chat
8_Q2 Post
8_Q3 True
8_Q4 False
8_Q5 Diary

30 Inspire Computing Workbook Year 8


What makes a good spreadsheet [U4_L2]

Question Answer Notes


1 ● TICK KEYWORDS
2 Include any three of the following:
● Make it easy to follow for the reader, is it clear which data
has been processed and why?
● Using clear headings for tables
● Using colours and formatting to highlight key area
● Avoid over-crowding a worksheet, information can be
spread of multiple sheets.

3 Include any three of the following:


● Text formatting
● Text alignment
● Use of borders
● Use of colours and fills

4 ● Design should be similar to that in textbook:

What is your favourite type of computer game?


1: Action
2: Platform
3: Racing

How much would you spend on a new game?

5 ● Again, the spreadsheet should look similar in style to the


example in the textbook.

6 ● A salary model, it might include important costs that if


edited may spoil the spreadsheet.
7 ● A template is a list of predesigned spreadsheets for
different purposes. They can be used as a starting point.

Question Answer Notes / Marks


8_Q1 Border
8_Q2 Quantitative
8_Q3 False
8_Q4 Protect sheet
8_Q5 Templates

31 Inspire Computing Workbook Year 8


Knowledge, data and information [U4_L3]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Data = a value that, on its own, has no meaning
● Information = data that has meaning
● Knowledge = making use of new information
3
Statement Knowledge Data Information
“This device isn’t popular, let’s change the design.” ✓
1024 ✓
Movie downloads = 120,000 ✓
99% ✓
“Based on this evidence, Python seems the best ✓
choice.”
Prices have increased by 20% this year. ✓

4 ● The examples should follow the same style as in the


textbook table.

5 ● Primary data is information you have collected yourself


● Secondary data is information that has already been
collected that you are using.
6
Examples Primary Secondary
Interviewing friends in your classroom ✓
Downloading data from a statistics website ✓
Going to the library to do research ✓
Video recording an important event live on your smartphone ✓
7 ● Answers might include:
● Primary: Interviewing someone on the high-street
● Secondary: Watching relevant films or tv shows

Question Answer Notes / Marks


8_Q1 True
8_Q2 Sound recorder
8_Q3 False
8_Q4 Archive video
8_Q5 False

32 Inspire Computing Workbook Year 8


Sorting and filtering a spreadsheet [U4_L4]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● The sort function allows data to be sorted either
alphabetically or numerically in an ascending or
descending order.
3 ● Because if the heading is selected it can be included in
the sort.

4 ● The filter tool allows only data to be displayed that meets


certain criteria.
5
A B
1 Money spent
2 $2.00
3 $8.20
4 $8.50
5 $12.00
6 $18.00
7 $32.00
8 $45.00

6
A B
1 Trainer size Favourite style
2 6 Sneaker
3 6 Boot
4 6 Basketball

7
8

7 ● A trend is a pattern that can be observed in one or more


data sources.

Question Answer Notes / Marks


8_Q1 Ascending
8_Q2 True
8_Q3 65, 13, 12, 11
8_Q4 Funnel
8_Q5 False

33 Inspire Computing Workbook Year 8


Design techniques for an online advertisement [U4_L5 & L6]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Unlike paper-based advertising in a magazine, newspaper
or leaflet, online advertising is often targeted at specific
users, a target audience with an interest in the product.
3 Include any three of the following:
● Attention grabbing
● The name of the product
● A special offer related to it
● Images of the product or people using it.

4 Include any three of the following:


● Website pages, on any size of device
● Social media pages
● Adverts within applications or games (in-app)

5 Include any three of the following:


● The size of the advert
● Does an image of the product need to be included?
● What text, heading and price information is required.
● Can a template be used?

6
Examples Suitable Not suitable
Stand out from the rest of the web page ✓
Choose a small range of colours ✓
Consider the colour theme of the product ✓
Colours change every few seconds ✓
7 ● Controls the number of advertisements to be displayed or
completely turns them off.

Question Answer Notes / Marks


8_Q1 Pixels
8_Q2 False
8_Q3 All of the above
8_Q4 Template
8_Q5 True

34 Inspire Computing Workbook Year 8


What makes a good chart [U4_L7 & L8]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Pie chart: used to show individual parts of a whole, ideal
for percentages.
● Line graph: shows the changing value over time.
● Bar/Column chart: displays the value of a range of similar
items against the same quantity, ideal for comparing
prices.
● Scatter graph: displays two sets of data to see if there a
connection between them.
3
Scenario Pie Chart Line Graph Bar/Column Scatter graph
chart
Battery charge time for ✓
different devices at different
ages.
The proportion of users on ✓
different operating systems.
Comparing the prices of ✓
similar smart watches.
The number of devices ✓
recycled over the last ten
years.
4. Percentages for each response, or a particular question, can be visually represented in a clear
way.

Question Answer Notes / Marks


5_Q1 3D Graphics
5_Q2 Key
5_Q3 Wizard
5_Q4 Percentages
5_Q5 True

35 Inspire Computing Workbook Year 8


Designing an infographic [U4_L9 & L10]

Question Answer Notes


1 ● TICK KEYWORDS
2 An infographic is designed to convey text, data and information in
a visually interesting and straightforward way that grabs the
attention of the reader.
3
Scenario Text Diagram Timeline Chart
The development ✓
of each generation
of mobile phone.
The internal ✓
workings of a
modern
smartphone.
The impact of the ✓
smartphone on
society.
Users of ✓
smartphones over
the last decade.

4 Include any three of the following:


● Use word-processing or presentation software you are
familiar with.
● Create charts and graphs in spreadsheet software and
copy them into another document.
● Use an online infographic creator, they have ready-made
templates that you can simply add text and charts to.
● Use desktop publishing software

Question Answer Notes / Marks


8_Q1 True
8_Q2 Portrait
8_Q3 Code editor
8_Q4 True
8_Q5 Pictogram

36 Inspire Computing Workbook Year 8


End of Unit Typical 4 Mark Questions

Question Key points to look for in answer Notes


1
● The sort function allows data to be sorted either alphabetically or
numerically in an ascending or descending order.
o Examples: Showing voting or population data (or any suitable
topic) in order.
● The filter tool allows only data to be displayed that meets certain criteria.
o Examples: Selecting a specific a topic from survey results (or
similar example).

2 ● Locations:
o Website pages, on any size of device
o Social media pages
o Adverts within applications or games (in-app)
● Tips:
o Attention grabbing
o The name of the product
o A special offer related to it
o Images of the product or people using it.
o Consider the size of the advert
o Does an image of the product need to be included?
o What text, heading and price information is required.
o Can a template be used?

37 Inspire Computing Workbook Year 8


Algorithms and turtle programming [U5_L1 & L2]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● An algorithm is a step-by-step series of logical
instructions.
3
Command Description
name = turtle.Turtle() Used to name the drawing turtle, for example, marker
Import turtle Instructs Python to open the turtle drawing module
fd(distance in pixels) Forward by a distance in pixels
bk(distance in pixels) Backward by a distance in pixels
rt(turn angle) Turn right by defined degrees
lt(turn angle) Turn left by defined degrees
penup() Lift up the pen, so no line is drawn when moved
pendown() Lower the pen, so lines can be drawn
pensize(size in pixels) Sets the size of the drawing turtle
pencolor(size in pixels) Sets the colour of the drawing turtle

4 ● floorPen = turtle.Turtle() = Create a new turtle called ‘floorPen’


● floorPen.pencolour(“red”) = Set the pen colour to red
● floorPen.bk(90) = Reverses the pen 90 units
● floorPen.rt(90) = Turns the pen 90 degrees to the right
5 ● Shape as below:

6 See: Y8_U5_L1-2_Simple02.py

#Simple Shape 2
import turtle
floorPen = turtle.Turtle()
floorPen.pencolor("Green")
floorPen.lt(135)
floorPen.fd(200)
floorPen.rt(90)
floorPen.fd(200)
floorPen.rt(90)
floorPen.fd(200)
floorPen.rt(90)
floorPen.fd(200)

Question Answer Notes / Marks


7_Q1 Centre
7_Q2 rt(180)
7_Q3 pencolor(“blue”)
7_Q4 True
7_Q5 True

38 Inspire Computing Workbook Year 8


Sequencing and iteration algorithms [U5_L3 & L4]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Sequencing: a logical series of instructions, one followed
by another from start to finish.
● Iteration: the use of loops or repeated actions until a
specified point is reached.
3 ● See: Y8_U5_L3-4_Q3.py

print("This is a smile :)")


print("This means sad :(")
print("This is a big smile :D")

4 ● See: Y8_U5_L3-4_Q4.py

for letter in ("VERTICAL"):


print(letter)

6 ● Shape as below:

Question Answer Notes / Marks


7_Q1 Iteration
7_Q2 Sequencing
7_Q3 An indentation
7_Q4 6
7_Q5 Reduce the number of lines

39 Inspire Computing Workbook Year 8


Programming errors [U5_L5]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● If a computer program comes across a problem, or error, it
just stops. It doesn't have the ability to solve its own
errors, this is why error checking any program is so
important.
3 ● Logic error: a fault with the design of the program itself,
this means the program may run but produce an incorrect
output.
● Syntax error: a mistake within a program that causes the
program to stop running. Syntax errors are normally
mistakes made by the programmer.
4 Include any three of the following:
● Check functions are spelt correctly.
● Check sentence case, especially in functions and
variables.
● Check characters and symbols.
● Check indentation, especially after an IF statement
● Proofread a printed copy by hand.

5
Logic error 1: Incorrect number for octagon
Logic error 2: Incorrect angle for octagon
Syntax error 1: Incorrectly spelt “green”
Syntax error 2: Incorrectly spelt “marker”

Y8_U5_L5_Errors01-CORRECT.py

Question Answer Notes / Marks


6_Q1 Incorrect angle within a graphic
6_Q2 True
6_Q3 Syntax error
6_Q4 True
6_Q5 Debugging

40 Inspire Computing Workbook Year 8


Using lists in a Python program [U5_L6]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● A list within Python is simply a group of objects, separated
by a comma and held within square brackets.
3 Include any two of the following:
● Objects can be of any data type.
● Objects can be accessed by index, as used in Year 7. The
first object is at position 0, the next 1.
● The list is mutable, this means it can be edited and re-
ordered as required
4 ● See: Y8_U5_L6_Q5.py

names = ["Joanna","Amos","Fletcher","Raya"]

values = [161,47,13,15]

floats = [7.34, 4.65, 12.45, 2.1]

5 ● del highScore[1]
● highScore += [250]
6 ● See: Y8_U5_L6_Q6.py

import random
days = ["Monday", "Tuesday", "Wednesday", "Thursday", "Friday", "Saturday", "Sunday"]
print(random.choice(days))

7 ● A computer-generated random number. It is suitable for


programs like the one on this page but is not truly random.

Question Answer Notes / Marks


8_Q1 Quotation mark
8_Q2 0
8_Q3 Delete the second in a list
8_Q4 Import random
8_Q5 True

41 Inspire Computing Workbook Year 8


Use of selection in an algorithm [U5_L7]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● Selection is used within an algorithm when a question is
asked, and a response is required.
3 Include any three of the following:
● Yes or no
● True or false
● A calculation using arithmetic or relational operators
● A text-based response
● A value from a sensor

5 ● IF: To query a variable and carry out an action if met


● ELSE: To carry out an action if the query is has not been
met.
6 ● > Greater than
● < Less than
● >= Greater than or equal to
● <= Less than or equal to
7 ● See: Y8_U5_L7_Q7.py

size = int(input("What size are you?"))


if size <= 9:
print("Welcome to our shop")
else:
print("Maybe try again next week")

Question Answer Notes / Marks


8_Q1 Input or output
8_Q2 Diamond
8_Q3 2
8_Q4 Colon
8_Q5 THEN

42 Inspire Computing Workbook Year 8


Creating a simple chatbot [U5_L8]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● A chatbot is a computer program designed to simulate a
two-way conversation between a real person and itself.
3
Number Annotation
1 Import random and time functions
5 The user’s response is converted to lowercase
6 This message is given when there is a response other than yes
3 A delay is used to make is seem like the chatbot is thinking
4 A random drink is chosen from the chatDrink list
2 User’s name is saved as variable name
4 ● Text-based messages
● Text-to-voice based systems
5 ● Display a friendly welcome message
● Ask questions of the user and respond to the answers
● Include acknowledgement of user responses in their own
responses.
6 ● The Turin test was created to challenge the ability of a
computer to simulate a real person in questioning.

Question Answer Notes / Marks


7_Q1 1950s
7_Q2 Restaurant
7_Q3 Artificial intelligence
7_Q4 time.sleep()
7_Q5 Exactly equal to

43 Inspire Computing Workbook Year 8


Sub programs in an algorithm [U5_L9]

Question Answer Notes


1 ● TICK KEYWORDS
2 ● To remove repetitive tasks from a larger algorithm, saving
time and lines of code.
3 Include any three of the following:
● It will be given a unique name
● It is a self-contained program or module
● It can be used in one or more programs.
● It can be called upon as and when required in the same program
● Once the sub program has been run, the main program will continue
4 Include any three of the following:
● The camera on your smartphone
● The mathematical functions on your scientific calculator
● The cooking programs in a microwave
● The Wi-Fi settings on a games console
● Any other realistic example
5
Subprogram description Procedures Functions
Reset a stopwatch variable to zero ✓
Add the current date to a document ✓
Open a pin entry screen ✓
Display a user warning message ✓
6 ● Potential answer:
See: Y8_U5_L9_Q6.py

def randomNumber():
number = random.randint(0, 9)
return number
7 ● Potential answer:
See: Y8_U5_L9_Q7.py

#four digit PIN


import random

def randomNumber():
number = random.randint(0, 9)
return number

print("This program will generate you a new for digit PIN")


print("Your new PIN number is:")
digit1 = randomNumber()
digit2 = randomNumber()
digit3 = randomNumber()
digit4 = randomNumber()
print(digit1,digit2,digit3,digit4)
Question Answer Notes / Marks
8_Q1 False
8_Q2 Subroutine
8_Q3 def name():
8_Q4 False
8_Q5 Function
44 Inspire Computing Workbook Year 8
Creating a missing word game [U5_L10]

Question Answer Notes


1 ● TICK KEYWORDS
2 Include any five of the following:
● Using sequence, selection and iteration algorithms
● Create and process variables
● Using lists to store multiple objects
● Using sub programs to remove repetitive lines of code
● Using arithmetic and relational operators to compare
variables
● Resolving syntax and logic errors
3 ● See the following file for a potential answer:
Y8_U5_L10_Q3-Q6.py

End of Unit Typical 4 Mark Questions

Question Key points to look for in answer Notes


1 ● Sequencing: a logical series of instructions, one followed by another
from start to finish.
● Iteration: the use of loops or repeated actions until a specified point is
reached.
● Iteration can be used to create a triangle by repeating the creation of
one side and a turning angle three times.

2 ● A list within Python is simply a group of objects, separated by a comma


and held within square brackets.
● Examples:
o names = ["Raffi","Bond","Lizzo","Risto"]
o numbers = [435,87,7613,1665]

45 Inspire Computing Workbook Year 8


Surveillance technology [U6_L1]

Question Answer Notes


1 • TICK KEYWORDS
2
Technology Example of surveillance
Smartphone Using positional data and GPS to track position, intercepting messages.
USB stick Installing spyware to look at files and communications.
Digital cameras Combined with facial recognition technology and event location data within
photos.
GPS equipment Tracking the position of anyone with GPS equipment.

3 • By adding an individual as a friend, their online activities, other


friends and location can be analysed.
4 Include any three of the following:
• Monitoring the number of emails being sent.
• Observing the times a user logs on and off.
• Analysing cloud-based documents to see when they have been
worked on.
• Observing group chats and messaging.
• Watching video call meetings.

5
Scenario Potential surveillance
Tracking a person across a city or • Face recognition using CCTV
town. • Smartphone tracking via mobile phone
network tower or GPS from apps.
Intercepting messages. • Intercepting emails and messaging
apps.
• Installing spyware on one person’s
device.
Looking at someone’s computer • Installing spyware or hacking online
files. document folders.

6 Software that can record the keystrokes, documents and Internet


history can be recorded and examined.

Question Answer Notes / Marks


7_Q1 Digital camera
7_Q2 Global positioning system
7_Q3 Intercept
7_Q4 True
7_Q5 Find out why the game might need access to your location.

46 Inspire Computing Workbook Year 8


Types of software [U6_L2]

Question Answer Notes


1 • TICK KEYWORDS
2 • Application = Programs we use on a day-to-day basis
• Operating system = The link between hardware and
software
• Utility = Software that supports the operating system
3
Application Operating system Utility
Web design Windows based systems Anti-virus/malware
Graphic Apple based systems Disk-defragmentation
Image-editing Linux based systems Back-up
Video games Compression
Video editing Encryption
Computer Aided Design (CAD) Formatting tools
Office based:
word processing, spreadsheet,
presentation or databases
4 Include any four of the following:
• Presentation
• Spreadsheet
• Work processing
• Database
• Email
• Calendar
5
Scenario Application Operating Utility
system

A virus needs to be removed from a computer 

A new computer has been purposed and has no 


installed software of any kind.

A spreadsheet needs to be created for a new 


business.

6 Include any three of the following:


• Smart speakers
• Smart watches
• Modern cars with in-car entertainment
• Smart televisions
• Any similar devices

7 • Open source software has been written to be freely


shared, distributed and edited by anyone as no cost.

Question Answer Notes / Marks


8_Q1 Operating system
8_Q2 True
8_Q3 True
8_Q4 Utility
8_Q5 True

47 Inspire Computing Workbook Year 8


Operating systems [U6_L3]

Question Answer Notes


1 • TICK KEYWORDS
2 Include any three of the following:
• Install applications, games from other creators.
• Install printers, microphone, webcams or any other
peripheral device we wish to add.
• Update our security settings to keep save online.
• Check that internal components are running effectively.
3 • User interface = On-screen display that allows the user to interact with the computer,
move the mouse and see applications.
• Memory management = Allocating memory space to programs and data
• Peripherals = Allows applications to interact with devices connected to the computer
• Multi-tasking = Allows two or more applications to run at the same time
• Security = Monitoring and controlling access to programs and data and preventing any
unauthorised access.
4 Include any three of the following:
• smartphones
• tablets
• smart speakers
• games consoles
• televisions

5 • GUI allows the user to move a cursor around the screen


and interact with icons and menus.
• CLI is text only, all commands are entered via keyboard
commands.
6
Task GUI CLI Dialogue Gesture/touch
Clicking and dragging files and folders 
Asking a smart speaker for a radio 
station
Swiping through digital photos 
Programming an old computer from 
the 1970s.

Question Answer Notes / Marks


8_Q1 Multi-tasking
8_Q2 Graphics card
8_Q3 Smart speaker
8_Q4 True
8_Q5 Gesture/touch

48 Inspire Computing Workbook Year 8


Utility programs [U6_L4]

Question Answer Notes


1 • TICK KEYWORDS
2 • Utility software includes functions that the operating
systems may not include but are useful in running the
computer, often in the background.
3 • Security = Preventing unauthorised access to your
computer.
• Disk organisation = Ensures files are organised and disks
are correctly formatted.
• Maintenance = Keeping an eye on system updates,
running back-ups.
4 Include any two of the following:
• CPU speed
• Memory use
• Hard drive capacity

5
Software Security Disk Maintenance
organisation
Anti-virus 

Disk defragmentation 

Back-up 

Firewall 

System clean-up 

Compression 

Encryption 

Disk formatting 

System information 

6 • New computer viruses and computer updates are created


every day and so software must also be set to auto update
as often as possible in order to be protective.

Question Answer Notes / Marks


7_Q1 True
7_Q2 Third party
7_Q3 Encryption
7_Q4 True
7_Q5 Firewall

49 Inspire Computing Workbook Year 8


Internet hardware [U6_L5]

Question Answer Notes


1 • TICK KEYWORDS
2 Any two of each:
• Wired: Router, Games console, Desktop computer,
switch, smart tv
• Wireless: Smartphone, tablet, laptop, smart speaker
Note: many wired devices are also wireless compatible as well.
3
Hardware Switch Wireless Network Modem
Access Interface
Point (WAP) Card (NIC)
Provides a connection for wireless devices 
to the local network.
Connects directly to the router and directs 
data to and from specific devices.
Allows a computer or laptop to connect to 
a wired or wireless network
Converts the data from the internet into a 
form your network can understand and
vice-versa.

4 • Modem and router


5 • Packet header = Information about where the data is from,
where it is going and its position in the message.
• Packet body = Part of the actual message data.
• Packet footer = This signals the end of the data packet
and checks the packet is complete.

6
Scenario Description of route
Sending a presentation from the tablet to the Tablet to laptop via WAP and switch
laptop.

Ordering takeaway pizza using the smart Speaker to Internet via ISP to modem, router,
speaker. switch and WAP

Question Answer Notes / Marks


8_Q1 False
8_Q2 Access the Internet
8_Q3 Service
8_Q4 True
8_Q5 Header

50 Inspire Computing Workbook Year 8


Wireless communications technology [U6_L6]

Question Answer Notes


1 • TICK KEYWORDS
2 • Wireless communication technology allows data to be
transmitted and received between compatible devices
without the need for a wired connection.
3 Include any two of the following:
• Home wireless networks
• Schools and offices
• Shops and leisure facilities
4 Include any two of the following:
• Contactless payments
• Transferring personal information between devices
• Checking into an event
5 Include any two of the following:
• Wireless headphones and speakers
• Wireless keyboards and mice
• Game control controllers
6
Advantages Disadvantages
Wi-Fi • Ideal in locations ethernet cables • Signal can be blocked by walls and
cannot be used. electrical devices can cause
• Passwords can be used to keep interference.
connections secure and private. • Not as fast as a wired connection.
NFC • Can be built into multiple devices • Some security concerns, money being
for easy payment. taken without consent (very little
• Convenience of contactless evidence and passkeys can be added
payments. to smartphones).
• Short range
Bluetooth • Compatible with many devices, • Limited range and only suitable for
even from different manufacturers. small amounts of data.
• Very little power required to • Danger of hackers using Bluetooth to
maintain connection. access devices, especially if left on at
all times.

7
Scenario Wi-Fi NFC Bluetooth

Paying for a hot chocolate in a café 

Connecting a tablet to a home network. 

Connecting to a new pair of wireless headphones 

Question Answer Notes / Marks


8_Q1 NFC
8_Q2 Monitor
8_Q3 Ethernet
8_Q4 NFC
8_Q5 True
51 Inspire Computing Workbook Year 8
The Internet and the World Wide Web [U6_L7]

Question Answer Notes


1 • TICK KEYWORDS
2 • The Internet: is the network of inter-connected networks
all around the world.
• The World Wide Web: is how we view web pages today
using HTML and web browsers.
3 • HTML (Hyper Text Mark-up Language) is the
programming language used to create content that can be
viewed and interreacted with using a web browser on any
compatible device.
4 • Correct order:
o Web address typed in
o Web browser accesses internet via modem, router
and ISP
o Web browser asks DNS server about web address
o DNS server searches for an IP address that
matches the web address
o DNS server sends IP address to browser
o Web browser opens website located at IP address

5 • The reason we have word based website addresses is


because they are much easier to remember than an IP
address.
6
Description IP ISP DNS Web
Address Server server
An international naming service that links 
internet addresses with an IP address.
A network connected computer server 
that stores website files.
A company that provides access to the 
Internet to homes, schools and
workplaces.
An identifying address assigned to every 
network connected device.

7 • Hosting describes the process of running a website on a


web server. The server hosts the website.

Question Answer Notes / Marks


8_Q1 Hypertext mark-up language
8_Q2 IP address
8_Q3 False
8_Q4 Domain Name System
8_Q5 Web browser

52 Inspire Computing Workbook Year 8


Surveillance ethics [U6_L8 & L9]

Question Answer Notes


1 • TICK KEYWORDS
2 Include any three of the following:
• To help solve crime
• To prevent terrorism
• To solve financial crimes
• To increase personal safety
• To confirm our identity
• To keep us safe online
3 Include three any of the following:
• Shopping suggestions
• New social media connections
• Increased shopping security
4 Include any thee of the following:
• Spotting criminals with CCTV
• Intercepting criminal messages
• Spotting criminal activity online
• Improved ID cards cannot be faked.
5 Include any three of the following:
• Is it legal for to be observed 24 hours a day?
• Is it OK for others to eavesdrop on my conversations?
• What is happening to all the data about me?
• Can I ask to see who is observing me?
• What if I don’t want to be observed?
• Why can’t my Internet searches be private?
• I haven’t done anything wrong, so why am I being observed?
• Is surveillance worth losing our freedom?
• Do I want someone to know geolocation information at all times?
6
Statement For Against
Increased security and data protection 
More secure online shopping and banking 
Lack of freedom 
People may be incorrectly charged with a crime 
Governments must keep up with criminals 
Concerns about data sharing 
Being able to stop criminal activity and cyberattacks. 
Information being used without our permission 

Question Answer Notes / Marks


7_Q1 Cheaper products
7_Q2 Hobbies and interests
7_Q3 True
7_Q4 Smartphone
7_Q5 True
53 Inspire Computing Workbook Year 8
Data breaches and cybercrime [U6_L10]

Question Answer Notes


1 • TICK KEYWORDS
2 • A data breach is the access of stored data without the
permission of those holding it.
3 Any three of the following:
• Usernames and passwords
• Credit cards details
• Personal details
• Social network content
• Cloud-based documents
4 Include any three of the following:
• Crashing a website so it cannot be accessed
• Spreading a computer virus to damage multiple computers
• Causing an online service to become unusable
• Gaining access to a system and stealing data stored within it
• Tricking users to give up personal information using email or messaging scams
5 • This is an email designed to look like an organisation we
know and it asks the user to click and update their details.
When clicked it will use a fake site to steal information.
Links within emails should never be clicked.
6
Information stolen Potential consequences
Username and password Accounts can be accessed and possible personal
data or even money stolen from accounts.
Personal details, including date of birth Accounts could be setup in your name to carry out
criminal activity

Credit card details Purchases can be made or money withdrawn


without permission.

Any other similar consequence is acceptable.


7
Weakness Prevention
Poor password protection Create strong passwords and do not share with
anyone.
Use of portable storage devices Do not share with anyone, avoid plugging into
computers you do not know.

Unpatched, or poorly updated, software Update regularly, if possible activates auto


updates.

Messages that can be intercepted and read. Don’t use unsecure messaging systems, avoid
sharing important or private info via message.

Question Answer Notes / Marks


8_Q1 True
8_Q2 Ijef453&EF2
8_Q3 USB stick
8_Q4 Eavesdropping
8_Q5 Delete it

54 Inspire Computing Workbook Year 8


End of Unit Typical 4 Mark Questions

Question Key points to look for in answer Notes


1 • Include any two or the following:
o Use of cameras and facial recognition: Many of these are
connected to the internet and combined with facial recognition
technology, our movements can be logged and tracked.
o Smartphone and smartwatch data: network tower and GPS
positions are used for apps and services. Assessing this
information can reveal the owners exact location.
o Spyware: by installing special software, the keystrokes,
documents and internet history can be recorded and examined.
It is also possible to access the users webcam without
permission.
o Intercepting messages: if the messaging services of an
individual are known, it is possible to hack and see messages
being sent and received.
o Social media sites: by adding an individual as a friend, their
online activities, other friends and location can be analysed.
o Hardware: If it can be easily replaced, an external drive, memory
stick, printer or any other device plugged into a computer can be
adapted to spy on a computer.
o Internet service providers: if required most law enforcement
agencies can access the Internet history.

2 • NFC is a short range wireless technology with a range of only a few


centimetres. It allows data to be communicated between two devices
placed next to each other.
• A smartwatch might use it for:
o Contactless payments
o Entry through smart gates
o Sharing contact information.

55 Inspire Computing Workbook Year 8

You might also like