0% found this document useful (0 votes)
18 views15 pages

Oct23 Computing

Uploaded by

osman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views15 pages

Oct23 Computing

Uploaded by

osman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Welcome!

Kindly scroll down to read introductory information.


Copyright © 2023 PB Pagez Exams Consult.
All Rights Reserved.

This examination question is a digital product developed and owned by PB


Pagez Exams Consult. This copyright notice serves to protect the intellectual
property rights associated with our soft copy examination questions and its
related components.

Unauthorized copying, distribution, uploading on apps and websites, selling,


modification, reproduction, or use of our examination questions in any form,
whether in part or whole, is strictly prohibited and may result in legal action.

Usage of our examination questions is permitted solely under terms and


conditions outlined in the applicable agreements provided with the product and
NOT for commercial purposes. Any buyer who intends to use it for
commercial purposes such as, but not limited to, printing for selling, reselling,
software development, online publishing, etc, MUST seek the express
permission of PB Pagez Exams Consult through [email protected]

All our contents are protected by intellectual property rights, including


copyright. Any violation of the terms and conditions stated in these agreements
will be considered a breach of this copyright notice. (Terms & Conditions page:
https://bit.ly/460EuAH)

Thank you for respecting the intellectual property rights associated with our
examination questions. We appreciate your cooperation and compliance with
this copyright notice.
Contact Information

Email:
[email protected]
[email protected]

Telephone:
(+233) 030 222 9253
(+233) 020 642 9275
(+233) 020 018 8187
(+233) 050 391 6684

Postal Address:
P.O. Box NT 327,
Accra Newtown,
Ghana.

Locations:
1137 Accra Newtown

Plot 1 Blk 1 Opp. Ramseyer,


Adum Kumasi.

Website:
consult.pbpagez.com
STARTER MOCK Name…………….……….…….……………..…
OCTOBER, 2023

COMPUTING
Essay And Objective
2&1 Index Number………….………………………..

2 HOURS

PB PAGEZ EXAMS CONSULT


Private Mock Examinations For BECE Candidates

OCTOBER, 2023 COMPUTING 2 & 1 2 HOURS

All answers must be provided on a clean sheet of paper (Answer booklet).


Write your name and index number on the sheets.

This booklet consists of two papers. Answer Paper 2 which comes first in your answer
booklet and Paper 1 on your Objective Answer Sheet. Paper 2 will last for 1 Hour and
15 minutes after which the answer booklet will be collected. Do not start Paper 1
until you are told to do so. Paper 1 will last 45 minutes.
Answer all questions in your answer booklet.

For Examiner’s Use Only


Question Number Mark

© 2023 PB Pagez Exams Consult 030 222 9523 | 020 642 9275
PAPER 2 1 ¼ Hour
ESSAY
[60 MARKS]

This paper is in two sections A and B. Answer Question 1 in Section A and any other three questions in
Section B. Answer all the questions in the spaces provided in this question paper. At the end of the
examination, you should submit the entire question paper to the invigilator.

SECTION A
[24 MARKS]
Answer Question 1.
[Compulsory]

1. Study the devices in Figure 1 and answer questions a to c.

A B C
Figure 1

a. i. What type of devices are shown in Figure 1? [2 marks]

………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
ii. Write the names of the devices labelled A, B and C. [6 marks]

A………………………………………………………………………………………………………………..
B…………………………………………………………………………………………………………..……
C……..…………………………………………………………………………………………………………
b. State one use each of device A, B and C. [6 marks]

A………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………

B………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………

C………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………….
c. Mention one:

i. disadvantage of device A. [2 marks]

………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
ii. advantage of choosing device B over device A. [2 marks]

………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..

d. Use the code below to answer the questions below.


int num1 = 7;
int num2 = num1 * 2;
int num3 = num2 * 3;
State:

i. the data type used in the code above. [2 marks]

………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..

ii. two variables used in the code. [2 marks]

………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..

iii. the value assigned to the first variable. [2 marks]

………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
SECTION B
[36 MARKS]
Answer three questions only from this section.
2. a. Complete the table by ticking (✓) the appropriate file type for each file extension. [8 marks]
File extension Image Video Word processing document
.docx
.png
.avi
.gif

b. i. List any two common internet browsers. [2 marks]


………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
ii. Mention any two examples of Information Security [2 marks]
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
3. Use the device below to answer question 3(a).

Figure 2
a. i. Identify the device in Figure 2. [2 marks]
……………………………………………………………………………………………………………….…
…………………………………………………………………………………………………………………..
ii. State two architects or components of the device in Figure 2. [4 marks]
……………………………………………………………………………………………………………….…
…………………………………………………………………………………………………………………..
b. Write an example each for the following in Computer programming [4 marks]
Data type One example
Integer
Boolean
Float
String

c. What is an email attachment? [2 marks]


………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
4. a. List two examples of;
i. spreadsheet application programs. [2 marks]
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
ii. word processing programs. [2 marks]
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
iii. presentation software. [2 marks]
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
iv. input devices. [2 marks]
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
b. Write two effects of breaking copyright laws in Ghana. [2 marks]
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
c. Identify the following symbols used in intellectual property rights. [2 marks]
i. ©
………………………………………………………………………………………………………………..…
ii. ™
…………………………………………………………………………………………………………………..
5. a. Tabulate two differences between the SSD and HDD commands in Storage. [4 marks]
Solid State Drive Hard Disk Drive

b. Define the following terminologies used in programming: [6 marks]


i. Constant

………………………………………………………………………………………………………………..…
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
ii. source code

………………………………………………………………………………………………………………..…
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
iii. algorithm

………………………………………………………………………………………………………………..…
………………………………………………………………………………………………………………..…
…………………………………………………………………………………………………………………..
c. Write the following computer networks acronyms in full. [2 marks]
i. MAN…………………………………………………………………………………………………………
ii. PAN…………………………………………………………………………………………………………
END OF ESSAY TEST
PAPER 1
OBJECTIVE TEST 45 Minutes
Answer All Questions

Each question is followed by four options lettered A to D. Find out the correct option for each question and
shade in pencil on your answer sheet the answer space which bears the same letter as the option you have
chosen. Give only one answer to each question.

1. A computer keyboard connected to a computer 8. A multimedia encyclopedia application


without the use of a wire or cable is called program which provides a variety of features
a….. for research and learning activities is called…
A. regular keyboard. A. MS Excel.
B. cabled keyboard. B. Scratch.
C. wireless keyboard C. Scrabble.
D. typewriter. D. Encarta.
2. What programming data type is used in the 9. The feature in Microsoft Word 2010 that
statement: var AgeOver15 = true? corrects common spelling errors is called
A. Integer A. AutoFormat
B. Float B. Grammar Checker
C. Boolean C. Spell Checker
D. Char D. AutoCorrect
3. A selected cell in MS Excel is also called 10. What are the types of alignments in Microsoft
A. current file. Excel?
B. active cell. A. Horizontal and justify alignments
C. inserted cell. B. Vertical and center alignments
D. calculated cell. C. Vertical and horizontal alignments
4. The application of scientific knowledge to D. Align Left and Align Right
create tools for solving problems is termed 11. Which one of the following statements best
as…… describes a file?
A. technology. A. A file contains several documents.
B. machine learning. B. Files cannot be commanded to print.
C. quantum computing. C. Files require special types of software.
D. technology application. D. A file has the same icon by the default file
5. What feature in MS PowerPoint is used to type.
move from one slide to the next slide with an 12. What are the benefits of using technology
effect? tools in learning?
A. Animations I. Students learn at their own pace.
B. Slide notes II. It encourages laziness.
C. Slide transitions III. Can be used for distance education.
D. Slide master IV. Students lose interest in learning
6. Which feature of the Windows 10 desktop easily.
provides a central launching point for A. I and IV
computer programs? B. II and III
A. System tray C. I and III
B. Start screen D. I, III and IV
C. Wallpaper 13. Float, integer, string and char are examples of
D. Cortana A. spreadsheet data types.
7. All the following are potential health hazards B. programming languages.
in using mobile phones except C. programming data types.
A. blood pressure. D. algorithms.
B. cancer. 14. Why are medical drones used in the health
C. hearing problems. sector?
D. motion injury. A. For taking pictures in the hospital.
B. For painting hospital buildings.
C. For supplying food items.
D. For delivering medical supplies.
15. A predefined set of colours, fonts and visual D. algorithm.
effects that you can apply to your slides for a
unified and professional look is called a 23. Mr. Boateng asked his secretary “how up-to-
PowerPoint……… date the links were” when she forwarded some
A. design. websites to him on WhatsApp. Which
B. theme technique for evaluating web pages did he
C. presentation use?
D. template. A. Currency
16. The electromagnetic wave that is emitted by B. Functionality
the computer and can cause damage to human C. Content
health is termed as……….. D. Objectivity
A. computer related disorder. 24. Which of the following is not a feature of the
B. repetitive strain injury. MS Word window interface?
C. computer radiation. A. Status bar
D. deep vein thrombosis. B. Formula bar
17. A computer program whose functionality has C. Document area
been deliberately limited, thus forcing the user D. View buttons
to purchase additional software is called 25. The pages in a presentation software are called
A. crippleware. A. pages.
B. freeware. B. sheets.
C. shareware. C. frames.
D. patent program. D. slides.
18. Which of the following data types should be 26. A cell reference is made up of two parts.
used for the data “TV3 News”? The……….
A. Currency A. row letter and column number.
B. Label B. column letter and row number.
C. Value C. sheet tab and zoom control.
D. Formula D. row number and column numbers.
19. How can a computer user prevent 27. The act of gaining access to a server, website
electrocution when using ICT tools? or other sensitive data using someone else’s
A. Keep drinks and water close to the account details is called
computer. A. hacking.
B. Open up the computer monitor to see what B. unauthorized access.
is inside. C. vulnerability.
C. Attempt fixing malfunctioning ICT tools. D. social engineering.
D. Do not tamper with electric cables. 28. One of the following is a use of machine
20. The process of creating, editing and printing learning.
text documents is referred to as…… A. War tactics
A. document processing. B. Speech recognition
B. document creation. C. Intelligence improvement
C. word printing. D. Human destruction
D. word processing. 29. The computer that provides resources to other
21. All the following are examples of open computers on a network is known as the
learning available on the internet except A. network.
A. Khan Academy B. topology.
B. GhanaWeb C. server.
C. Code Academy D. client.
D. Coursera 30. The use of dedicated websites and applications
22. A special program that processes statements to interact with other users, or to find people
written in a particular programming language with similar interests to one's own is referred
and turns them into machine language that a to as
computer’s processor uses is called a/an A. microblogging.
A. loops. B. photo sharing.
B. assembler. C. social networking.
C. compiler. D. browsing.
Use the diagram in figure 1 to answer questions 37. Which of the following techniques is
31 and 32. appropriate for evaluating web pages?
I. Currency
II. Accuracy
III. Content
IV. Beauty
A. I and II
31. Which network topology is shown in Figure B. II and IV
1? C. II, III and IV
A. Ring topology D. I, II and III
B. Mesh topology 38. A procedure used for solving a problem or
C. Star topology performing a computation in programming is
D. Bus topology known as a/an
32. All the following are advantages of using the A. algorithm.
network topology in Figure 1 except B. pseudo code.
A. Transmits data in both directions. C. source code.
B. Easy to connect a computer and peripheral D. flowchart.
devices. 39. Robots can be grouped into two main types.
C. It requires less cable length than a star A. Fixed and mobile robots.
topology. B. Mobile and moving robots.
D. Each computer has equal access to C. Hybrid and analogue robots.
resources. D. Technical and educational robots.
33. One of the following is not a social 40. The acronym Wi-Fi stands for
networking site. A. wire fidelity.
A. WhatsApp B. wireless fidelity.
B. Facebook C. wide area fidelity.
C. LinkedIn D. wired fidelity.
D. X (Twitter)
34. What are the tenets of information security?
A. Cryptography, security and confidentiality
B. Vulnerability, availability and security.
C. Security, integrity and confidentiality.
D. Confidentiality, integrity and availability.
35. A word, phrase, symbol or design that
identifies and distinguishes the source of the
goods of one party from those of others is
termed as…………
A. patent.
B. trademark.
C. piracy.
D. copyright.
36. The world wide web can also be referred to as
the……..
A. internet.
B. dark web.
C. net
D. web.
PB PAGEZ EXAMS CONSULT
OCTOBER, 2023 MOCK EXAMINATION

FINAL COMPUTING MARKING SCHEME


PAPER 1
OBJECTIVE TEST
[40 MARKS]

1. C 6. B 11. C 16. C 21. B 26. B 31. D 36. D


2. C 7. D 12. C 17. A 22. C 27. B 32. D 37. D
3. B 8. D 13. C 18. B 23. A 28. B 33. D 38. A
4. A 9. D 14. D 19. D 24. B 29. C 34. D 39. A
5. C 10. C 15. B 20. D 25. D 30. C 35. B 40. B

PAPER 2
[60 MARKS]

Question 1

a. i. TYPE OF DEVICE SHOWN IN FIGURE 1


Output devices [2 marks]

ii. NAMES OF THE DEVICES LABELLED A, B AND C.

A. CRT monitor / Cathode-ray tube monitor


B. LED monitor / Light emitting diode monitor
C. Projector [6 marks @ 2 marks each]

b. USES OF DEVICE A, B AND C

Uses of device A
▪ They are used with light pens for example, to allow designs to be created on screen.
▪ They were used as primary output device for computers so users can see immediately what they are
typing in. [2 marks for 1 point]

Uses of device B
▪ They are used as primary output device for computer users to see what they are typing.
▪ They are an integral part of laptop computers. [2 marks for 1 point]

Uses of device C
▪ Used for training presentations
▪ Used for business meeting presentations
▪ Teachers use projectors to deliver lesson presentations.
▪ Advertising presentations
▪ Home cinema systems. [2 marks for 1 point]

c. i. DISADVANTAGES OF DEVICE A
▪ They consume more electricity.
▪ Bulky and heavy.
▪ They run very hot and can cause fires if left unattended to.
▪ They can flicker, which can lead to headaches and eyesight problems with prolonged use.
[2 marks for 1 point]
ii. ADVANTAGES OF CHOOSING DEVICE B OVER DEIVCE A

▪ They consume less electricity compared to the CRT monitor.


▪ They do not produce much heat as the CRT monitor.
▪ They are light in weight and won’t pose the same risks as CRT monitors. [2 marks for 1 point]
d. i. THE DATA TYPE USED IN THE CODE
Integer [2 marks]

ii. VARIABLES USED IN THE CODE


Variables used in the code includes
▪ num1
▪ num2
▪ num3 [any two = 2 marks]

iii. VALUE ASSIGNED TO THE FIRST VARIABLE


The variable num1 is assigned the value of 7. [2 marks]

Question 2

a. APPROPRIATE FILE TYPE FOR EACH FILE EXTENTION

File extension Image Video Word processing document


.docx ✓
.png ✓
.avi ✓
.gif ✓

[8 marks @ 2 marks each]

b. i. COMMON INTERNET BROWSERS


▪ Google Chrome
▪ Mozilla Firefox
▪ Microsoft Edge
▪ UC Browser
▪ Internet Explorer
▪ Opera
▪ Brave
▪ Chromium
▪ Safari
▪ Vivaldi, etc. [2 marks @ 1 mark each]

ii. ACCRONYM IN FULL


Repetitive strain injury [2 marks]

Question 3

a. i. IDENTIFY THE DEVICES IN FIGURE 2

Central processing unit / processor / central processor [2 marks]

ii. GENERATION OF COMPUTERS WHERE THESE TECHNOLOGIES WERE USED


Memory
Control unit
Arithmetic and logic unit (ALU) [4 marks @ 2 marks each]
b. EXAMPLES FOR EACH NUMBER FORMATS IN MS EXCEL

Data type One example


Percentage 12%, 40%, 2%, 55%, 100%, 23%, 90%, etc.
Time 12:44 PM, 10:00 AM, 4:00 PM, etc.
Currency $300.00, ₵14.00, Є30.00, etc.
Date 23/06/2013, Thursday, 19 May, 2023, 19-05-23, 19 May 2023, 19.5.23, etc.

[4 marks @ 1 mark each]

c. DEFINITION OF EMAIL ATTACHMENT


An email attachment is a computer file sent along with an email message.

OR An email attachment is simply an additional file sent with an email message. An attachment can be an
image file, a Word document, or one of many other supported file types. [2 marks]

Question 4

a. i. EXAMPLES OF SPREADSHEET APPLICATION PROGRAMS

▪ MS Excel
▪ Numbers
▪ Google Sheets
▪ Lotus 1-2-3
▪ OpenOffice
▪ LibreOffice
▪ iWork Numbers
▪ Lotus Symphony, etc. [2 marks @ 1 mark each]

ii. EXAMPLES OF WORD PROCESSING PROGRAMS

▪ Microsoft Word
▪ OpenOffice Writer
▪ Apple Pages
▪ Google Docs
▪ AbiWord
▪ LibreOffice Writer
▪ Notepad
▪ WPS
▪ WordPad
▪ Zoho Writer, etc. [2 marks @ 1 mark each]

iii. EXAMPLES OF INPUT DEVICES

▪ Keyboard
▪ Mouse
▪ Light pen
▪ Touchscreen
▪ Barcode reader
▪ Microphone
▪ Webcam
▪ Scanner
▪ Optical mark recognition
▪ Joystick, etc. [2 marks @ 1 mark each]
b. EFFECTS OF BREAKING COPYRIGHT LAWS IN GHANA

▪ Imprisonment
▪ Fine or penalty
▪ Seizure of product or items.
▪ The person can be ordered by the court of law to stop producing the product.
[2 marks @ 1 mark each]

c. SYMBOLS USED IN INTELLECTUAL PROPERTY RIGHTS

I : Copyright symbol

II: Trademark symbol [2 marks @ 1 mark each]

Question 5

a. DIFFERENCES BETWEEN THE UNDO & REDO COMMANDS IN MS WORD

Undo command Redo command


The Undo command is used to undo the The Repeat or Redo command is used to undo an
previous action. action previously performed with the undo command.
The shortcut key combination is Ctrl + Z The shortcut key combination is Ctrl + Y

[4 marks @ 1 mark each]

b. DEFINITION OF TERMS

i. Bug: A an error, flaw or fault in the design, development, or operation of computer software that causes it
to produce an incorrect or unexpected result, or to behave in unintended ways. [2 marks]

ii. Source code: A source code is a programming statements that are created by a programmer with a text
editor or a visual programming tool and then saved in a file. OR A written set of instructions using protocols
of a specific computer language. [2 marks]

iii. Declaration: It describes a variable, function or any other identifier. OR A statement describing an
identifier, such as the name of a variable or a function. [2 marks]

c. COMPUTER NETWORK ACONYMNS IN FULL


i. MAN : Metropolitan Area Network
ii. PAN : Personal Area Network [2 marks @ 1 mark each]

You might also like