0% found this document useful (0 votes)
66 views

Computing

Uploaded by

Kafui Augustine
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Computing

Uploaded by

Kafui Augustine
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

EDUCATION-NEWS

CONSULT

2024 BECE MOCK 7


COMPUTING 1 & 2
2 HOURS Name: ................................................................

Index Number: .................................................

EDUCATION-NEWS CONSULT – DODOWA, ACCRA


Enhancing student performance through quality assessment
EDUCATION-NEWS CONSULT MOCK FOR 2024 BECE
Call us on 0550360658 to register your school or ward for our monthly result focused mocks set
by top examiners
SPECIAL PERFORMANCE BOOSTER – MOCK 7
MAY, 2024 - COMPUTING - 2 HRS
Do not open this booklet until you are told to do so. While you are waiting, read and observe the
following instructions carefully. Write your name and index number in ink in the spaces provided
above.
This booklet consists of two papers; I and II. Answer Paper 2 which comes first in your answer
booklet and Paper 1 on your Objective Test answer sheet. Paper 2 will last for 1 hour and 15 mins,
after which the answer book let will be collected. Do not start Paper until you are told to do so.
Paper 1 will last 45 minutes.
VERY IMPORTANT INSTRUCTIONS
1. Read through the questions, brainstorm and plan your answers before you finally answer them.
This is one of the good ways to manage your time in an exam and to do well.
2. Write clearly, use simple expressions and provide the best answers possible.
3. Write answers that provide additional information. If you just list answers or provide one to
three worded answers, your will fail the paper.
4. Do well to explain your answers to help earn full marks. Check your units of measurement,
spellings, grammar and read over your work before submitting.
5. Write question numbers boldly, start every new major question (answers) on a new page.
6. Do not rewrite the full question before answering. Only write the question number.
7. Show workings in all instances in section B if the question involves calculations

1|Page Das Exams DCCAE -10-30-23/24


PAPER 2-60MARKS
SECTION A-PRACTICAL [24 marks]
Answer question one and any other three questions
1. (a) Consider the following spreadsheet and answer the questions that follow:
A B C D E F G
1 R.No. Name Theory Practical Total Percentage Remarks
50 50 100
2 1 Aaryan 48 49
3 2 Manas 35 40
4 3 Swati 40 42
5 4 Kabeer 42 40
6 5 Shradha 39 41

i. Write a formula/function to calculate the Total


……………………………………………………………………………………………………………………2marks
ii. Write the feature used to arrange the Name in descending order.
………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………2marks
iii. Write the formula/function to find the percentage.
……………………………………………………………………………………………………………………2marks
iv. To find the Average of total to be written in cell E7.
……………………………………………………………………………………………………………………2marks

b. Four pseudocode statements and five pseudocode uses are shown. 4marks
Draw one line to link each pseudocode statement to the most appropriate pseudocode use.
Not all pseudocode uses will be required.
Pseudocode statement Pseudocode use
Counti
CALL Colour(NewColour)
ng

Finding an average
Value (A1 + A2 +
A3)/3
Totalli
Loop1 Loop1 + 1 ng

Using a conditional statement


IF Count > 7 THEN X1 0

Using a procedure
c. Name the actions for the operators below 6marks
Operator Action
+
-
*
/
^
()

d. Below are programming codes. Provide the outputs 6marks


i. Cost←10 = ……………………………………………………………………………….
ii. Price ←cost*2 = ……………………………………………………………………………….
iii. Tax ←Price*0.12. = ……………………………………………………………………………….
iv. SellingPrice ←Price + Tax = …………………………………………………………………………….
v. Gender ←“M” = ……………………………………………………………………………
vi. Chosen ← False = ………………………………………………………………………………

SECTION B-36 marks


Answer three questions from this section
2(a) Write two each of;

i. Input device
………………………………………………………………………………………………………………
ii. Output device
……………………………………………………………………………………………………4marks
(b) State the three key principles of information security

i………………………………………………………………………………………………………………
ii………………………………………………………………………………………………………………
iii...........................................................................................................................................................................3marks
(c) Explain the following concerning copyright
i. Patent
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
ii. Freeware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
iii. Shareware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
iv. Crippleware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
v. Piracy
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………5marks

3 (a) Explain the following

i. Cyberbullying

………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. Cyberstalking

………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. Digital footprint

………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iv. Digital shadow

………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………4marks
(b) Isah is opening a social media account. Help Isah by stating four risks associated with the use of
social media
i. ………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. ………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. ………………………………………………………………………………………………………………..
………………………………………………………………………………………………………4marks
(c) Explain the following hacking techniques
i. Phishing
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. Keyloggers
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. Denial of service attack
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iv. Eavesdropping
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………4marks
4(a) Explain the following in programming

i. Variables
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..

ii. Operators

……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..

iii. Controls
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..

iv. Events
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………4marks

(b) State four importance of using social media


……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..…………
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………4marks
(c) List four online banking systems

……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..…………
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………4marks

5. Explain the following


(i) e-learning
…………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
ii). Internet
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………4marks
b. State three importance of e-learning
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………4marks
c. Differentiate between template and macros
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………4marks
PAPER 1-40MARKS-45 minutes [Answer all questions

1. Which of the following functions allows you to 10. Which of the following is a primary key in a
change the appearance of text in a word processing database table?
document? a) A field that uniquely identifies each record in the table
a) Format b) A field that can be null
b) Edit c) A field that is indexed for quick retrieval
c) View d) A field that is encrypted
d) Insert 11. In a spreadsheet, what is a cell reference?
2. Which option in a word processor allows you to a) The name of the spreadsheet file
automatically arrange text in alphabetical or numerical b) The location of a cell, based on its column and row
order? c) The formula used in a cell
a) Sort d) The type of data stored in a cell
b) Align 12. What function in a spreadsheet allows you to
c) Group automatically sum a range of cells?
d) Format a) MAX
3. What is the shortcut key to undo the last action in b) MIN
most word processing programs? c) AVG
a) Ctrl + Z d) SUM
b) Ctrl + X 13. Which of the following is NOT a valid
c) Ctrl + Y mathematical operator in spreadsheet formulas?
d) Ctrl + C a) +
4. Which feature in word processing software helps you to b) %
find and replace specific words or phrases throughout a c) /
document? d) ^
a) Spell check 14. What does it mean to "merge cells" in a spreadsheet?
b) Grammar check a) To combine two or more cells into one larger cell
c) Find and Replace b) To split a cell into smaller cells
d) AutoCorrect c) To format cells as currency
5. What is the purpose of a firewall in computer networks? d) To hide cells from view
a) To protect against viruses
b) To regulate network traffic 15. What does CPU stand for?
c) To improve network speed a) Central Processing Unit
d) To encrypt data transmission b) Computer Personal Unit
6. Which of the following is NOT an example of a network c) Computer Programming Unit
protocol? d) Central Personal Unit
a) TCP/IP 16. Which of the following is NOT a component of a
b) HTTP computer?
c) JPEG a) Monitor
d) FTP b) Keyboard
7. What does the acronym "VPN" stand for? c) Mouse
a) Virtual Private Network d) Java
b) Very Personal Network 17. What is the purpose of an operating system?
c) Virtual Public Network a) To manage computer hardware and software resources
d) Visible Private Network b) To browse the internet
8. Which programming language is commonly used for c) To create spreadsheets
web development? d) To write programs
a) Java 18. What is the purpose of RAM in a computer?
b) Python a) To permanently store data
c) HTML b) To temporarily store data and program
d) C++ instructions that a computer is actively using
9. What is the primary purpose of a loop in programming? c) To control input and output devices
a) To repeat a block of code d) To provide long-term storage
b) To terminate the program 19. Which of the following file extensions typically
c) To generate random numbers indicates a spreadsheet file?
d) To sort data a) .docx
b) .xls
c) .jpg
d) .html
b) To convert digital signals into analog signals for
transmission over telephone lines
20. What is the purpose of an IP address? c) To store data permanently
a) To identify a specific location on the internet d) To prevent unauthorized access to a network
b) To format text in a word document 31. Which of the following is NOT a type of
c) To store data in a database computer memory?
d) To encrypt emails a) RAM
21. What is the process of converting data into a code b) ROM
to prevent unauthorized access called? c) CPU
a) Decryption d) Cache
b) Encoding 32. What is the purpose of a search engine?
c) Compression a) To create spreadsheets
d) Encryption b) To browse the internet
22. What is the purpose of a hyperlink in a document? c) To manage computer hardware and software resources
a) To add formatting to text d) To encrypt data transmission
b) To insert a picture 33. Which of the following is NOT a function of an
c) To provide a quick way to navigate to another location operating system?
d) To embed a video a) To manage computer hardware resources
23. Which of the following is NOT a type of computer b) To create spreadsheets
network? c) To run applications
a) LAN d) To provide a user interface
b) MAN 34. Which of the following is an example of an
c) WAN output device?
d) USB a) Keyboard
24. Which of the following is NOT a characteristic of b) Mouse
a strong password? c) Monitor
a) Contains a mix of uppercase and lowercase letters d) Microphone
b) Contains personal information such as your name 35. What is the purpose of a spreadsheet program?
or birthdate a) To manage computer hardware and software resources
c) Includes numbers and special characters b) To create and manipulate numerical data
d) Is at least 8 characters long c) To browse the internet
25. Which of the following is NOT a valid data type in d) To write programs
most programming languages? 36. What is the primary purpose of a loop in programming?
a) Integer b) Float c) Text d) Sound a) To repeat a block of code
26. What is the purpose of a DNS server? b) To terminate the program
a) To store website data c) To generate random numbers
b) To translate domain names into IP addresses d) To sort data
c) To send emails 37. What is the purpose of ROM in a computer?
d) To provide network security a) To permanently store data
27. Which of the following is an example of an input b) To temporarily store data and program
device? instructions that a computer is actively using
a) Printer c) To control input and output devices
b) Monitor d) To provide long-term storage
c) Keyboard 38. What is the role of the controller in a robot?
d) Speaker a) To provide mechanical movement
28. What does the acronym URL stand for? b) To act as the brain of the robot
a) Universal Resource Locator c) To sense the environment
b) Uniform Resource Language d) To control the temperature
c) Universal Remote Link 39. Which of the following mechanical components of a
d) Uniform Remote Locator robot is responsible for gripping objects?
29. Which of the following is NOT a type of a) Motors
computer virus? b) Pistons
a) Trojan Horse c) Gears
b) Worm d) Grippers
c) Firewall 40. How can sensors contribute to a robot's functionality?
d) Spyware A) By providing mechanical power
30. What is the purpose of a modem? B) By acting as the brain of the robot
a) To connect to a network wirelessly C) By inputting data into a computer system
D) By controlling the robot's temperature

You might also like