ICT Answers Grade 8 Singapore

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Answers for ICT Questions - Form 1 / Grade 8 (Singapore Curriculum)

Basic Computer Operations

1. The operating system manages computer hardware and software resources, providing a user interface a

2. Hardware refers to the physical components of a computer (e.g., keyboard, monitor), while software refe

3. The CPU processes instructions from programs, performs calculations, and manages data flow within th

4. Input devices: keyboard, mouse, microphone. Output devices: monitor, printer, speakers.

5. RAM (Random Access Memory) temporarily stores data and program instructions that are in use, allowin

Digital Literacy

6. File extensions indicate the type of file and the software that can open it (e.g., .docx for Word documents

7. Use meaningful folder names, group similar files together, and avoid storing too many files in the root dir

8. Cloud storage offers accessibility from any device with internet access, automatic backups, and file-shar

9. Use a combination of uppercase and lowercase letters, numbers, and special characters, and avoid usin

10. Copyright gives creators legal rights to control the use and distribution of their original works, preventing

Software Applications

11. Word processing software is used for creating and editing text documents (e.g., Microsoft Word), while

12. Click on 'Insert' in the menu bar, select 'Picture,' then choose the image from your computer or online.

13. Creating tables, performing mathematical calculations using formulas, and generating charts to visualiz

14. Highlight the text, then use the formatting toolbar to change the font style, size, color, or apply bold, ital

15. Start with an equals sign (=), followed by the formula (e.g., =SUM(A1:A10) to add the values in cells A1

Internet Safety

16. Risks include identity theft, phishing attacks, and misuse of personal data by malicious actors.

17. Phishing is a scam where attackers trick individuals into revealing personal information by pretending to

18. Look for 'https' in the URL and a padlock icon in the address bar.

19. Report the incident to a trusted adult or authority, block the bully, and keep evidence of the messages.

20. Updates often contain security patches that protect against new threats and vulnerabilities.

Computational Thinking
21. An algorithm is a step-by-step set of instructions for solving a problem or completing a task. It is essent

22. Sequential execution follows steps in order, while conditional execution depends on whether a certain c

23. A flowchart visually represents the flow of an algorithm, making it easier to understand and plan the pro

24. Debugging involves finding and fixing errors in a program's code to ensure it runs correctly.

25. Loops allow a program to repeat a set of instructions multiple times, reducing the need for writing repet

Problem Solving with ICT Tools

26. Databases store data in structured formats, allowing users to sort, search, and retrieve information effic

27. Define the problem, design an algorithm, write the code using a programming language, test the progra

28. They enable real-time communication, file sharing, and document editing, making it easier for team me

29. Highlight the data, select the 'Insert' menu, choose the type of chart (e.g., bar, line, pie), and customize

30. Vector graphics are made of scalable geometric shapes, while raster graphics are composed of pixels a

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy