May Computing Mock 2024
May Computing Mock 2024
b. Four pseudocode statements and five pseudocode uses are shown. 4marks
Draw one line to link each pseudocode statement to the most appropriate pseudocode use.
Not all pseudocode uses will be required.
Pseudocode statement Pseudocode use
Counting
CALL Colour(NewColour)
Finding an average
Value (A1 + A2 + A3)/3
Totalling
Loop1 Loop1 + 1
Using a procedure
c. Name the actions for the operators below 6marks
Operator Action
+
-
*
/
^
()
i. Input device
………………………………………………………………………………………………………………
ii. Output device
……………………………………………………………………………………………………4marks
(b) State the three key principles of information security
i………………………………………………………………………………………………………………
ii………………………………………………………………………………………………………………
iii. ……………………………………………………………………………………………………3marks
(c) Explain the following concerning copyright
i. Patent
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
ii. Freeware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
iii. Shareware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
iv. Crippleware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
v. Piracy
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………5marks
i. Cyberbullying
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. Cyberstalking
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. Digital footprint
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iv. Digital shadow
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………4marks
(b) Isah is opening a social media account. Help Isah by stating four risks associated with the use of
social media
i. ………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. ………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. ………………………………………………………………………………………………………………..
………………………………………………………………………………………………………4marks
(c) Explain the following hacking techniques
i. Phishing
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. Keyloggers
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. Denial of service attack
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iv. Eavesdropping
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………4marks
4(a) Explain the following in programming
i. Variables
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..
ii. Operators
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..
iii. Controls
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..
iv. Events
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………4marks
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..…………
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………4marks
1. Which of the following functions allows you to change 10. Which of the following is a primary key in a database
the appearance of text in a word processing document? table?
a) Format a) A field that uniquely identifies each record in the table
b) Edit b) A field that can be null
c) View c) A field that is indexed for quick retrieval
d) Insert d) A field that is encrypted
2. Which option in a word processor allows you to 11. In a spreadsheet, what is a cell reference?
automatically arrange text in alphabetical or numerical a) The name of the spreadsheet file
order? b) The location of a cell, based on its column and row
a) Sort c) The formula used in a cell
b) Align d) The type of data stored in a cell
c) Group 12. What function in a spreadsheet allows you to
d) Format automatically sum a range of cells?
3. What is the shortcut key to undo the last action in most a) MAX
word processing programs? b) MIN
a) Ctrl + Z c) AVG
b) Ctrl + X d) SUM
c) Ctrl + Y 13. Which of the following is NOT a valid mathematical
d) Ctrl + C operator in spreadsheet formulas?
4. Which feature in word processing software helps you to a) +
find and replace specific words or phrases throughout a b) %
document? c) /
a) Spell check d) ^
b) Grammar check 14. What does it mean to "merge cells" in a spreadsheet?
c) Find and Replace a) To combine two or more cells into one larger cell
d) AutoCorrect b) To split a cell into smaller cells
5. What is the purpose of a firewall in computer networks? c) To format cells as currency
a) To protect against viruses d) To hide cells from view
b) To regulate network traffic
c) To improve network speed 15. What does CPU stand for?
d) To encrypt data transmission a) Central Processing Unit
6. Which of the following is NOT an example of a network b) Computer Personal Unit
protocol? c) Computer Programming Unit
a) TCP/IP d) Central Personal Unit
b) HTTP 16. Which of the following is NOT a component of a
c) JPEG computer?
d) FTP a) Monitor
7. What does the acronym "VPN" stand for? b) Keyboard
a) Virtual Private Network c) Mouse
b) Very Personal Network d) Java
c) Virtual Public Network 17. What is the purpose of an operating system?
d) Visible Private Network a) To manage computer hardware and software resources
8. Which programming language is commonly used for web b) To browse the internet
development? c) To create spreadsheets
a) Java d) To write programs
b) Python 18. What is the purpose of RAM in a computer?
c) HTML a) To permanently store data
d) C++ b) To temporarily store data and program instructions
9. What is the primary purpose of a loop in programming? that a computer is actively using
a) To repeat a block of code c) To control input and output devices
b) To terminate the program d) To provide long-term storage
c) To generate random numbers 19. Which of the following file extensions typically
d) To sort data indicates a spreadsheet file?
a) .docx
b) .xls
c) .jpg
d) .html
b) To convert digital signals into analog signals for
transmission over telephone lines
20. What is the purpose of an IP address? c) To store data permanently
a) To identify a specific location on the internet d) To prevent unauthorized access to a network
b) To format text in a word document 31. Which of the following is NOT a type of computer
c) To store data in a database memory?
d) To encrypt emails a) RAM
21. What is the process of converting data into a code to b) ROM
prevent unauthorized access called? c) CPU
a) Decryption d) Cache
b) Encoding 32. What is the purpose of a search engine?
c) Compression a) To create spreadsheets
d) Encryption b) To browse the internet
22. What is the purpose of a hyperlink in a document? c) To manage computer hardware and software resources
a) To add formatting to text d) To encrypt data transmission
b) To insert a picture 33. Which of the following is NOT a function of an
c) To provide a quick way to navigate to another location operating system?
d) To embed a video a) To manage computer hardware resources
23. Which of the following is NOT a type of computer b) To create spreadsheets
network? c) To run applications
a) LAN d) To provide a user interface
b) MAN 34. Which of the following is an example of an output
c) WAN device?
d) USB a) Keyboard
24. Which of the following is NOT a characteristic of a b) Mouse
strong password? c) Monitor
a) Contains a mix of uppercase and lowercase letters d) Microphone
b) Contains personal information such as your name or 35. What is the purpose of a spreadsheet program?
birthdate a) To manage computer hardware and software resources
c) Includes numbers and special characters b) To create and manipulate numerical data
d) Is at least 8 characters long c) To browse the internet
25. Which of the following is NOT a valid data type in most d) To write programs
programming languages? 36. What is the primary purpose of a loop in programming?
a) Integer b) Float c) Text d) Sound a) To repeat a block of code
26. What is the purpose of a DNS server? b) To terminate the program
a) To store website data c) To generate random numbers
b) To translate domain names into IP addresses d) To sort data
c) To send emails 37. What is the purpose of ROM in a computer?
d) To provide network security a) To permanently store data
27. Which of the following is an example of an input b) To temporarily store data and program instructions
device? that a computer is actively using
a) Printer c) To control input and output devices
b) Monitor d) To provide long-term storage
c) Keyboard 38. What is the role of the controller in a robot?
d) Speaker a) To provide mechanical movement
28. What does the acronym URL stand for? b) To act as the brain of the robot
a) Universal Resource Locator c) To sense the environment
b) Uniform Resource Language d) To control the temperature
c) Universal Remote Link 39. Which of the following mechanical components of a
d) Uniform Remote Locator robot is responsible for gripping objects?
29. Which of the following is NOT a type of computer a) Motors
virus? b) Pistons
a) Trojan Horse c) Gears
b) Worm d) Grippers
c) Firewall 40. How can sensors contribute to a robot's functionality?
d) Spyware A) By providing mechanical power
30. What is the purpose of a modem? B) By acting as the brain of the robot
a) To connect to a network wirelessly C) By inputting data into a computer system
D) By controlling the robot's temperatur