29 Computing
29 Computing
APRIL 2025
Index Number……………………………….……………
COMPUTING 2&1
Essay and Objective
2 hours 2&1 Signature…………………………………………………..
Date of Examination………………………………………
Do not open this booklet until you are told to do so. While you are waiting, read and observe the following
instructions. Write your Name and Index Number, Signature and Date of Examination in ink in the spaces
provided above.
This booklet consists of two papers. Answer paper 2 which comes first, in the booklet and Paper 1 on your Objective
Test answer sheet. Paper 2 will last 1 hour 15 minutes. Do not start paper 1 until you are told to do so. Paper 1
will last 45 minutes. At the end of the examination, submit the entire question paper to the invigilator.
Any candidate who tears off any part of the question paper will be severely penalized.
Whether you answer all the questions in this paper or not, hand in the entire question paper to the invigilator.
TOTAL
PAPER 2 1 hour 15 minutes
ESSAY
This paper consists of two sections: A and B. Answer questions 1 in section A and any other three questions
in section B. All questions carry equal marks. Answer all the questions in the spaces provided in this question
paper.
SECTION A
[20 MARKS]
Answer Question 1 (compulsory)
a . What is the name of the application program which was used in creating the above file?
……………………………………………………………………………………………[1 Mark]
……………………………………………………………………………………………[2 Marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………...[7 marks]
d. State the functions or the uses of the buttons labelled B and D [4 marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………….……………………………………………………………………………...
………………………………………………………………………………………………………...
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
e. Your computer desktop has displayed a particular wallpaper or background image over the
years. It has now become necessary to replace it with a different desktop wallpaper.
Demonstrate the appropriate steps you will follow to change the computer’s desktop wallpaper
or background image.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………………………………………………………………………………… [3 marks]
f. Your father decided to use Microsoft Office Publisher to create a birthday card for his wife’s
upcoming birthday. He tried several times to launch the program but could not do so. As a
computing student, demonstrate how you will assist your father to launch Microsoft Publisher
whose icon or logo is pined on the start menu or tiles.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………… [4 marks]
g. Identify any four parts or features of the scratch window [4 marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
SECTION B
[36 MARKS]
Answer any three questions only from this section.
2. a. Kwame was not in the school the day the topic “Network topology” was taught. Your
teacher wants you to help Kwame to understand the concept of the topic “Network topology”. In
your own word, how will you explain the term “Network topology”.
…………………………………………………………………………………………………………
………………………………………………………………………………………………….………
……………………………………………………………………………………………………….…
………………………………………………………………………………………………………….
…........................................................................................................................................... [2 marks]
b. Data threat is a topical issue in computing environment. Data security is the act of preventing
unauthorized people from accessing your electronic data. Explain each of the following four
major data threats:
i. Fabrication:
………………………………………………………………………………………………..……….
………………………………………………………………………………………………….………
……………………………………………………………………………………………. [2 marks]
ii. Interruption:………………………………………………………………………………………
………………………………………………………………………………………………….………
……………………………………………………………………………………………. [2 marks]
iii. Modification:………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………. [2 marks]
c. Identify the following types of network topology. [4 marks]
A B C D
A=…………………………………………..……………………………………………..
B=……………………………………………………………………………………………..
C=…………………………………..…………………………………………………………
D=…………………………………………………………………………………………….
3. a. Save as command button is perceived to be used to save a newly created document.
Currently, it has been realized that it can also be used to re-save edited files with existing named.
Indicate when the following commands of the backstage view would be used when re-saving an
edited file.
i. Save As:
………………………………………………………………………………………...………………
…………………………………………………………………………………..……………………
……………………………………………………………………………………………… [2 marks]
ii. Save: ………………………………………………………………………………………….……
………………………………………………………………………………………………….…….
………………………………………………………………………………………………[2 marks]
b. In programing environment, State the main difference between software testing and debugging.
[4 marks]
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
c. Kofi brought home a printer and connected it to his computer to print a file but the printer
failed to print though the connection was properly done.
i. As a computing student, state what Kofi failed to do upon connecting the printer to the computer.
[1 mark]
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..………………
ii. To overcome the problem what should Kofi do? [2 marks]
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..………………
iii. Why would a pen drive or keyboard work instantly with a computer as soon as you insert?
[1 mark]
……………………………………………………………………………………..……..……………
…………………………………………………………………………………………………………
4. a. Demonstrate how you will use a “Plug-and-play” devices such as an external hard disk on
your personal laptop.
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..…… [4 marks]
b. The first law of robotics based on science fiction by Asimov state that, “A robot may not
injure a human being, or, through inaction, allow human being to come to harm.”. In your
own words, explain the primary goal behind the first law of robotic by Asimov.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………… [2 marks]
d. In software environment, what is the difference between disabling and uninstalling? [2 marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
e. Demonstrate how you will rename a given folder with the existing name “Try Me Mock” to “Best
Time Mock”
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………… [2 marks]
5. Email is an internet platform used to send, receive and store messages on electronic medium.
State the functions of the following commands of the compose window. [5 marks]
a. To: ………………………………………………………………………………………….
b. Subject: …………………………………………………………………………………….
c. Cc: ……………………………………………………..…………………………………..
d. State the principles of data security and explain any one of them [2 marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
f. In executing a block of code, indicate when the following flow control structures can be used
i. Iteration. ………………………………………………………………………………………….
….......................................................................................................................................... [1 mark]
ii. Selection …………………………………………………………………………………………
…......................................................................................................................................... [1 mark]
iii. Sequence ………………………………………………………………………………………….
…......................................................................................................................................... [1 marks]
END OF ESSAY
PAPER 1
45 Minutes
OBJECTIVE TEST
Answer All Questions
Each question is followed by four options lettered A to D. Find the correct option for each question
and shade in pencil on your answer sheet the space which bears the same letter as the option you
have chosen. Give only one answer to each question.
19. …………………..is a feature of a worksheet 26. The electronic sheet made of cells is termed
marked by letters. as …………………….
A. Electronic File
A. Sheet tab B. Worksheet
B. Column C. Workbooks
C. Row D. Name box
D. Formula bar
27. The space of a worksheet that displays 33. …………..simply refers to the act of
the name of an active cell is the …………. adjusting the icons size to a preferred size.
A. Name box A. Resizing
B. Name space B. Customize
C. Active cell box C. Personalization
D. Status bar D. Mapping
28. What letter denotes the hard drive 34. All the following are precaution to be
that runs the operating system and taken when using a computer to prevent
the computer system? health problems associated with the use of
A. Local disk A
B. Local Disk B computer except.
C. Local disk C A. Use good sitting posture.
D. Local Disk D
B. Put the mouse and the keyboard at a
29. ……………..are the computer-based position where your wrist can get support.
machines uses to send, receive, C. Do not sit by a computer for more hours.
disseminate and manage information. Break and exercise the body.
A. Technology D. Adjust the brightness of the screen
B. Assistive tools (monitor) to a level your eye cannot
C. ICT tool tolerate.
D. Supportive tools 35. An optical device that projects an
image onto a surface, commonly a
30. A storage container of the computer which
projection screen is termed as
keeps deleted files, programs and folders
A. Monitor
temporarily before it is permanently deleted
B. Television
from the computer system is the …………..
A. Draft folder. C. Tape recorder
B. Recycle bin D. Projector
C. This PC
D. My Document 36. …………..is a digital multimedia
encyclopedia published by Microsoft
31. I am a block in a scratch window or Corporation provides content based
interface which allow sprites to information.
communicate with each other. Who am I? A. MSN Encarta
A. Even block B. Google meet
B. Motion block C. Skype
C. Sound block D. Zoom
D. Control block
37. All are examples of spreadsheet application
32. Overused or improper usage of computer programs except …………….
can result in the following except A. Visi Calc
B. Super calc
A. Sleep deprivation and dizziness. C. Ability spreadsheet
B. Pain in the waist, back bone, etc. D. Apple page
C. Eye irritation, poor sight
D. Fainting
38. The block-based visual programming A. Mechanical mouse
language and online community targeted B. Optical mouse
primarily at children which is used to create C. Laser mouse
D. Cord mouse
online projects using a block-like interface is
called …………………….
40. The area where you can drag and
A. Scratch
manipulate blocks of code to make your
B. Google meet
Scratch project is termed as ……………...
C. MSN Encarta
A. Sprite area
D. Google classroom
B. Script
C. Scri pt area
39. All are the main types of computer mouse
D. Block area
except …………………..
END OF PAPER