0% found this document useful (0 votes)
58 views9 pages

May Computing Mock 2024

The document is an examination booklet for the 2024 BECE Mock in Computing, consisting of two papers with specific instructions for answering questions. It includes various sections covering practical tasks, programming concepts, information security, and computer fundamentals. The exam is structured to assess students' knowledge and skills in computing over a duration of two hours.

Uploaded by

picadophotos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views9 pages

May Computing Mock 2024

The document is an examination booklet for the 2024 BECE Mock in Computing, consisting of two papers with specific instructions for answering questions. It includes various sections covering practical tasks, programming concepts, information security, and computer fundamentals. The exam is structured to assess students' knowledge and skills in computing over a duration of two hours.

Uploaded by

picadophotos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

EDUCATION-NEWS CONSULT

2024 BECE MOCK 7


COMPUTING 1 & 2
2 HOURS Name: ................................................................

Index Number: .................................................

EDUCATION-NEWS CONSULT – DODOWA, ACCRA


Enhancing student performance through quality assessment
EDUCATION-NEWS CONSULT MOCK FOR 2024 BECE
Call us on 0550360658 to register your school or ward for our monthly result focused mocks set
by top examiners
SPECIAL PERFORMANCE BOOSTER – MOCK 7
MAY, 2024 - COMPUTING - 2 HRS
Do not open this booklet until you are told to do so. While you are waiting, read and observe the
following instructions carefully. Write your name and index number in ink in the spaces provided
above.
This booklet consists of two papers; I and II. Answer Paper 2 which comes first in your answer
booklet and Paper 1 on your Objective Test answer sheet. Paper 2 will last for 1 hour and 15 mins,
after which the answer book let will be collected. Do not start Paper until you are told to do so.
Paper 1 will last 45 minutes.
VERY IMPORTANT INSTRUCTIONS
1. Read through the questions, brainstorm and plan your answers before you finally answer them.
This is one of the good ways to manage your time in an exam and to do well.
2. Write clearly, use simple expressions and provide the best answers possible.
3. Write answers that provide additional information. If you just list answers or provide one to
three worded answers, your will fail the paper.
4. Do well to explain your answers to help earn full marks. Check your units of measurement,
spellings, grammar and read over your work before submitting.
5. Write question numbers boldly, start every new major question (answers) on a new page.
6. Do not rewrite the full question before answering. Only write the question number.
7. Show workings in all instances in section B if the question involves calculations

1|Page Das Exams DCCAE-10-30-23/24


PAPER 2-60MARKS
SECTION A-PRACTICAL [24 marks]
Answer question one and any other three questions
1. (a) Consider the following spreadsheet and answer the questions that follow:
A B C D E F G
1 R.No. Name Theory Practical Total Percentage Remarks
50 50 100
2 1 Aaryan 48 49
3 2 Manas 35 40
4 3 Swati 40 42
5 4 Kabeer 42 40
6 5 Shradha 39 41

i. Write a formula/function to calculate the Total


……………………………………………………………………………………………………………………2marks
ii. Write the feature used to arrange the Name in descending order.
………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………2marks
iii. Write the formula/function to find the percentage.
……………………………………………………………………………………………………………………2marks
iv. To find the Average of total to be written in cell E7.
……………………………………………………………………………………………………………………2marks

b. Four pseudocode statements and five pseudocode uses are shown. 4marks
Draw one line to link each pseudocode statement to the most appropriate pseudocode use.
Not all pseudocode uses will be required.
Pseudocode statement Pseudocode use
Counting
CALL Colour(NewColour)

Finding an average
Value (A1 + A2 + A3)/3

Totalling
Loop1 Loop1 + 1

Using a conditional statement


IF Count > 7 THEN X1 0

Using a procedure
c. Name the actions for the operators below 6marks
Operator Action
+
-
*
/
^
()

d. Below are programming codes. Provide the outputs 6marks


i. Cost←10 = ……………………………………………………………………………….
ii. Price ←cost*2 = ……………………………………………………………………………….
iii. Tax ←Price*0.12. = ……………………………………………………………………………….
iv. SellingPrice ←Price + Tax = …………………………………………………………………………….
v. Gender ←“M” = ……………………………………………………………………………
vi. Chosen ← False = ………………………………………………………………………………

SECTION B-36 marks


Answer three questions from this section
2(a) Write two each of;

i. Input device
………………………………………………………………………………………………………………
ii. Output device
……………………………………………………………………………………………………4marks
(b) State the three key principles of information security

i………………………………………………………………………………………………………………
ii………………………………………………………………………………………………………………
iii. ……………………………………………………………………………………………………3marks
(c) Explain the following concerning copyright
i. Patent
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
ii. Freeware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
iii. Shareware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
iv. Crippleware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
v. Piracy
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………5marks

3 (a) Explain the following

i. Cyberbullying

………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. Cyberstalking

………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. Digital footprint

………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iv. Digital shadow

………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………4marks
(b) Isah is opening a social media account. Help Isah by stating four risks associated with the use of
social media
i. ………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. ………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. ………………………………………………………………………………………………………………..
………………………………………………………………………………………………………4marks
(c) Explain the following hacking techniques
i. Phishing
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. Keyloggers
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. Denial of service attack
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iv. Eavesdropping
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………4marks
4(a) Explain the following in programming

i. Variables
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..

ii. Operators

……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..

iii. Controls
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..

iv. Events
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………4marks

(b) State four importance of using social media


……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..…………
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………4marks
(c) List four online banking systems

……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..…………
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………4marks

5. Explain the following


(i) e-learning
…………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
ii). Internet
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………4marks
b. State three importance of e-learning
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………4marks
c. Differentiate between template and macros
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………4marks
PAPER 1-40MARKS-45 minutes [Answer all questions

1. Which of the following functions allows you to change 10. Which of the following is a primary key in a database
the appearance of text in a word processing document? table?
a) Format a) A field that uniquely identifies each record in the table
b) Edit b) A field that can be null
c) View c) A field that is indexed for quick retrieval
d) Insert d) A field that is encrypted
2. Which option in a word processor allows you to 11. In a spreadsheet, what is a cell reference?
automatically arrange text in alphabetical or numerical a) The name of the spreadsheet file
order? b) The location of a cell, based on its column and row
a) Sort c) The formula used in a cell
b) Align d) The type of data stored in a cell
c) Group 12. What function in a spreadsheet allows you to
d) Format automatically sum a range of cells?
3. What is the shortcut key to undo the last action in most a) MAX
word processing programs? b) MIN
a) Ctrl + Z c) AVG
b) Ctrl + X d) SUM
c) Ctrl + Y 13. Which of the following is NOT a valid mathematical
d) Ctrl + C operator in spreadsheet formulas?
4. Which feature in word processing software helps you to a) +
find and replace specific words or phrases throughout a b) %
document? c) /
a) Spell check d) ^
b) Grammar check 14. What does it mean to "merge cells" in a spreadsheet?
c) Find and Replace a) To combine two or more cells into one larger cell
d) AutoCorrect b) To split a cell into smaller cells
5. What is the purpose of a firewall in computer networks? c) To format cells as currency
a) To protect against viruses d) To hide cells from view
b) To regulate network traffic
c) To improve network speed 15. What does CPU stand for?
d) To encrypt data transmission a) Central Processing Unit
6. Which of the following is NOT an example of a network b) Computer Personal Unit
protocol? c) Computer Programming Unit
a) TCP/IP d) Central Personal Unit
b) HTTP 16. Which of the following is NOT a component of a
c) JPEG computer?
d) FTP a) Monitor
7. What does the acronym "VPN" stand for? b) Keyboard
a) Virtual Private Network c) Mouse
b) Very Personal Network d) Java
c) Virtual Public Network 17. What is the purpose of an operating system?
d) Visible Private Network a) To manage computer hardware and software resources
8. Which programming language is commonly used for web b) To browse the internet
development? c) To create spreadsheets
a) Java d) To write programs
b) Python 18. What is the purpose of RAM in a computer?
c) HTML a) To permanently store data
d) C++ b) To temporarily store data and program instructions
9. What is the primary purpose of a loop in programming? that a computer is actively using
a) To repeat a block of code c) To control input and output devices
b) To terminate the program d) To provide long-term storage
c) To generate random numbers 19. Which of the following file extensions typically
d) To sort data indicates a spreadsheet file?
a) .docx
b) .xls
c) .jpg
d) .html
b) To convert digital signals into analog signals for
transmission over telephone lines
20. What is the purpose of an IP address? c) To store data permanently
a) To identify a specific location on the internet d) To prevent unauthorized access to a network
b) To format text in a word document 31. Which of the following is NOT a type of computer
c) To store data in a database memory?
d) To encrypt emails a) RAM
21. What is the process of converting data into a code to b) ROM
prevent unauthorized access called? c) CPU
a) Decryption d) Cache
b) Encoding 32. What is the purpose of a search engine?
c) Compression a) To create spreadsheets
d) Encryption b) To browse the internet
22. What is the purpose of a hyperlink in a document? c) To manage computer hardware and software resources
a) To add formatting to text d) To encrypt data transmission
b) To insert a picture 33. Which of the following is NOT a function of an
c) To provide a quick way to navigate to another location operating system?
d) To embed a video a) To manage computer hardware resources
23. Which of the following is NOT a type of computer b) To create spreadsheets
network? c) To run applications
a) LAN d) To provide a user interface
b) MAN 34. Which of the following is an example of an output
c) WAN device?
d) USB a) Keyboard
24. Which of the following is NOT a characteristic of a b) Mouse
strong password? c) Monitor
a) Contains a mix of uppercase and lowercase letters d) Microphone
b) Contains personal information such as your name or 35. What is the purpose of a spreadsheet program?
birthdate a) To manage computer hardware and software resources
c) Includes numbers and special characters b) To create and manipulate numerical data
d) Is at least 8 characters long c) To browse the internet
25. Which of the following is NOT a valid data type in most d) To write programs
programming languages? 36. What is the primary purpose of a loop in programming?
a) Integer b) Float c) Text d) Sound a) To repeat a block of code
26. What is the purpose of a DNS server? b) To terminate the program
a) To store website data c) To generate random numbers
b) To translate domain names into IP addresses d) To sort data
c) To send emails 37. What is the purpose of ROM in a computer?
d) To provide network security a) To permanently store data
27. Which of the following is an example of an input b) To temporarily store data and program instructions
device? that a computer is actively using
a) Printer c) To control input and output devices
b) Monitor d) To provide long-term storage
c) Keyboard 38. What is the role of the controller in a robot?
d) Speaker a) To provide mechanical movement
28. What does the acronym URL stand for? b) To act as the brain of the robot
a) Universal Resource Locator c) To sense the environment
b) Uniform Resource Language d) To control the temperature
c) Universal Remote Link 39. Which of the following mechanical components of a
d) Uniform Remote Locator robot is responsible for gripping objects?
29. Which of the following is NOT a type of computer a) Motors
virus? b) Pistons
a) Trojan Horse c) Gears
b) Worm d) Grippers
c) Firewall 40. How can sensors contribute to a robot's functionality?
d) Spyware A) By providing mechanical power
30. What is the purpose of a modem? B) By acting as the brain of the robot
a) To connect to a network wirelessly C) By inputting data into a computer system
D) By controlling the robot's temperatur

You might also like