0% found this document useful (0 votes)
8 views11 pages

29 Computing

The document is a mock examination for Computing 2&1 scheduled for April 2025, consisting of two papers: an essay and an objective test. Paper 2 includes various sections with questions related to application software, network topology, data security, and programming concepts, while Paper 1 contains multiple-choice questions on computer fundamentals. Candidates are instructed to follow specific guidelines during the examination, including submission protocols and penalties for tearing the question paper.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views11 pages

29 Computing

The document is a mock examination for Computing 2&1 scheduled for April 2025, consisting of two papers: an essay and an objective test. Paper 2 includes various sections with questions related to application software, network topology, data security, and programming concepts, while Paper 1 contains multiple-choice questions on computer fundamentals. Candidates are instructed to follow specific guidelines during the examination, including submission protocols and penalties for tearing the question paper.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

MOCK EXAMINATION Name………………………………………………………

APRIL 2025
Index Number……………………………….……………
COMPUTING 2&1
Essay and Objective
2 hours 2&1 Signature…………………………………………………..

Date of Examination………………………………………

KROWOR MUNICIPAL EDUCATION DIRECTORATE

APRIL 2025 COMPUTING 2 & 1 2 hours

Do not open this booklet until you are told to do so. While you are waiting, read and observe the following
instructions. Write your Name and Index Number, Signature and Date of Examination in ink in the spaces
provided above.

This booklet consists of two papers. Answer paper 2 which comes first, in the booklet and Paper 1 on your Objective
Test answer sheet. Paper 2 will last 1 hour 15 minutes. Do not start paper 1 until you are told to do so. Paper 1
will last 45 minutes. At the end of the examination, submit the entire question paper to the invigilator.

Any candidate who tears off any part of the question paper will be severely penalized.

Whether you answer all the questions in this paper or not, hand in the entire question paper to the invigilator.

For Examiner’s Use Only


Question Number Mark

TOTAL
PAPER 2 1 hour 15 minutes
ESSAY

This paper consists of two sections: A and B. Answer questions 1 in section A and any other three questions
in section B. All questions carry equal marks. Answer all the questions in the spaces provided in this question
paper.

SECTION A
[20 MARKS]
Answer Question 1 (compulsory)

1. The image below shows an interface of a particular application program or productivity


software. Use the interface to answer the questions which follow

a . What is the name of the application program which was used in creating the above file?

……………………………………………………………………………………………[1 Mark]

b. What category of application does the application above belong to?

……………………………………………………………………………………………[2 Marks]

c. Name the parts of the window labelled A to G. [7 Marks]

…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………...[7 marks]

d. State the functions or the uses of the buttons labelled B and D [4 marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………….……………………………………………………………………………...
………………………………………………………………………………………………………...
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………

e. Your computer desktop has displayed a particular wallpaper or background image over the

years. It has now become necessary to replace it with a different desktop wallpaper.
Demonstrate the appropriate steps you will follow to change the computer’s desktop wallpaper
or background image.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………………………………………………………………………………… [3 marks]

f. Your father decided to use Microsoft Office Publisher to create a birthday card for his wife’s

upcoming birthday. He tried several times to launch the program but could not do so. As a
computing student, demonstrate how you will assist your father to launch Microsoft Publisher
whose icon or logo is pined on the start menu or tiles.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………… [4 marks]
g. Identify any four parts or features of the scratch window [4 marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………

SECTION B
[36 MARKS]
Answer any three questions only from this section.

2. a. Kwame was not in the school the day the topic “Network topology” was taught. Your
teacher wants you to help Kwame to understand the concept of the topic “Network topology”. In
your own word, how will you explain the term “Network topology”.

…………………………………………………………………………………………………………
………………………………………………………………………………………………….………
……………………………………………………………………………………………………….…
………………………………………………………………………………………………………….
…........................................................................................................................................... [2 marks]

b. Data threat is a topical issue in computing environment. Data security is the act of preventing
unauthorized people from accessing your electronic data. Explain each of the following four
major data threats:

i. Fabrication:
………………………………………………………………………………………………..……….
………………………………………………………………………………………………….………
……………………………………………………………………………………………. [2 marks]

ii. Interruption:………………………………………………………………………………………
………………………………………………………………………………………………….………
……………………………………………………………………………………………. [2 marks]

iii. Modification:………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………. [2 marks]
c. Identify the following types of network topology. [4 marks]

A B C D
A=…………………………………………..……………………………………………..
B=……………………………………………………………………………………………..
C=…………………………………..…………………………………………………………
D=…………………………………………………………………………………………….
3. a. Save as command button is perceived to be used to save a newly created document.
Currently, it has been realized that it can also be used to re-save edited files with existing named.
Indicate when the following commands of the backstage view would be used when re-saving an
edited file.
i. Save As:
………………………………………………………………………………………...………………
…………………………………………………………………………………..……………………
……………………………………………………………………………………………… [2 marks]
ii. Save: ………………………………………………………………………………………….……
………………………………………………………………………………………………….…….
………………………………………………………………………………………………[2 marks]
b. In programing environment, State the main difference between software testing and debugging.
[4 marks]
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
c. Kofi brought home a printer and connected it to his computer to print a file but the printer
failed to print though the connection was properly done.
i. As a computing student, state what Kofi failed to do upon connecting the printer to the computer.
[1 mark]
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..………………
ii. To overcome the problem what should Kofi do? [2 marks]
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..………………
iii. Why would a pen drive or keyboard work instantly with a computer as soon as you insert?
[1 mark]
……………………………………………………………………………………..……..……………
…………………………………………………………………………………………………………

4. a. Demonstrate how you will use a “Plug-and-play” devices such as an external hard disk on
your personal laptop.
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..………………
………………………………………………………………………………..………..…… [4 marks]

b. The first law of robotics based on science fiction by Asimov state that, “A robot may not
injure a human being, or, through inaction, allow human being to come to harm.”. In your
own words, explain the primary goal behind the first law of robotic by Asimov.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………… [2 marks]

c. In programming, what is the difference between “Variables” and “Constant”


…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………. [2 marks]

d. In software environment, what is the difference between disabling and uninstalling? [2 marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
e. Demonstrate how you will rename a given folder with the existing name “Try Me Mock” to “Best
Time Mock”
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………… [2 marks]

5. Email is an internet platform used to send, receive and store messages on electronic medium.
State the functions of the following commands of the compose window. [5 marks]

a. To: ………………………………………………………………………………………….
b. Subject: …………………………………………………………………………………….
c. Cc: ……………………………………………………..…………………………………..

d. State the principles of data security and explain any one of them [2 marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………

e. Consider this expression or statement “ a + 5 /(3*c) “


i. State the operators in the statement ................................................................................ ..[1 mark]
ii. Identify the operands in the statement….……………………………………………….[1 mark]

f. In executing a block of code, indicate when the following flow control structures can be used
i. Iteration. ………………………………………………………………………………………….
….......................................................................................................................................... [1 mark]
ii. Selection …………………………………………………………………………………………
…......................................................................................................................................... [1 mark]
iii. Sequence ………………………………………………………………………………………….
…......................................................................................................................................... [1 marks]

END OF ESSAY
PAPER 1
45 Minutes
OBJECTIVE TEST
Answer All Questions
Each question is followed by four options lettered A to D. Find the correct option for each question
and shade in pencil on your answer sheet the space which bears the same letter as the option you
have chosen. Give only one answer to each question.

for schools that aim to create, distribute, share


1. The Very Large Scale Integrated (VLSI) files and grade students assignments, who am I?
circuits is also called . A. Zoom
A. Microprocessors B. Google meet
B. Capacitor C. MSN Encarta
C. Transistor D. Google classroom
D. Motherboard
9. All the follow can be default folders
2. is the logic circuitry that responds to and of the computer except ………….
processes the basic instructions that drive a A. Pictures
computer. B. Music
A. Motherboard C. My Video
B. Processor D. New folder
C. Diodes
D. Memory unit 10. When a computer user wants to open a
program whose icon is on the desktop,
3.Collection of related programs that are he can right click on the icon and then
bundled as a single package is called choose .......................... from the pop
A. Software Suit up menu.
B. Software suit Suite A. Copy
C. Program B. Paste
D. Application C. Open
D. Cut
4. is an important icon that assist the user 11. How many blocks are there in scratch
to navigate through the computer. application.
A. Title bar
B. Menu A. 8
C. This PC B. 10
D. Mouse Pointer C. 12
6. Which of these is not example of a D. 14
computer processor 12. The blue color-coded block which
A. Quard core,
B. Pentium 4, controls a sprite's movement is called
C. Delta 5 A. Pen block
D. Core i7
B. Event block
C. Motion block
7. All the following can be used to
D. Sensing block
launch Ms. Word application except
A. Triple clicking on the icon
B. Double clicking on the icon 13. All the following are the components of
C. Using the search bar a computer processor except.
D. Right clicking on the icon and select open A. Memory Unit
B. Control Unit
8. I am a free web service developed by Google C. Instruction Unit
D. Registers 20. ……………..is a default storage container
or a folder responsible for storing all kinds
14. I am a default icon of a computer desktop
of documents created on the computer.
which displays the computers network A. My Document
printers, and other network resources B. My Pictures
available on a given computer network, who C. This PC
am I? D. Network places
A. Network card
B. My computer 21. ………………are the input device which
C. My network places are operated by the computer user and are
D. My document used by people to enter data by hand.
A. Automated Input device
B. Manual Input devices
15. Which of the following input devices C. Wireless input devices
contains several keys that are pressed to D. Cord input Devices
input data or raw fact into the
computer? 22. People with intellectual disabilities can
A. Mouse suffer all the following except
B. Keyboard A. Communication,
C. Scanner B. Self-care
D. Joystick C. Social skills
D. Poor vision
How to Adjust the Size of the Desktop Icons
Choose the correct answer that best fits the 23. The vertical blocks or lines of a worksheet is
called …………………….
blank spaces for questions 16-18. A. Column
B. Workbook
16. ………at an empty space of the desktop. C. Active cell
A. Click D. Row
B. Double click
C. Right Click 24. The horizontal blocks or lines of a worksheet
D. Drag is called ……………………
A. Column
17. From the context menu or pop-up menu, B. Workbook
point to ………………….. C. Active cell
A. Properties D. Row
B. Personalize
C. View 25. ………………….refers to the devices and
D. Home services that are used to increase, maintain, or
improve the capabilities of a student with a
18. From the sub menu, select either small, disability.
medium or ………………….. A. Ascensive technology
A. Big icons B. Adaptive technology
B. Fat icons C. Assistive technology
C. Tall icon
D. Large icons D. Technology devices

19. …………………..is a feature of a worksheet 26. The electronic sheet made of cells is termed
marked by letters. as …………………….
A. Electronic File
A. Sheet tab B. Worksheet
B. Column C. Workbooks
C. Row D. Name box
D. Formula bar
27. The space of a worksheet that displays 33. …………..simply refers to the act of
the name of an active cell is the …………. adjusting the icons size to a preferred size.
A. Name box A. Resizing
B. Name space B. Customize
C. Active cell box C. Personalization
D. Status bar D. Mapping

28. What letter denotes the hard drive 34. All the following are precaution to be
that runs the operating system and taken when using a computer to prevent
the computer system? health problems associated with the use of
A. Local disk A
B. Local Disk B computer except.
C. Local disk C A. Use good sitting posture.
D. Local Disk D
B. Put the mouse and the keyboard at a
29. ……………..are the computer-based position where your wrist can get support.
machines uses to send, receive, C. Do not sit by a computer for more hours.
disseminate and manage information. Break and exercise the body.
A. Technology D. Adjust the brightness of the screen
B. Assistive tools (monitor) to a level your eye cannot
C. ICT tool tolerate.
D. Supportive tools 35. An optical device that projects an
image onto a surface, commonly a
30. A storage container of the computer which
projection screen is termed as
keeps deleted files, programs and folders
A. Monitor
temporarily before it is permanently deleted
B. Television
from the computer system is the …………..
A. Draft folder. C. Tape recorder
B. Recycle bin D. Projector
C. This PC
D. My Document 36. …………..is a digital multimedia
encyclopedia published by Microsoft
31. I am a block in a scratch window or Corporation provides content based
interface which allow sprites to information.
communicate with each other. Who am I? A. MSN Encarta
A. Even block B. Google meet
B. Motion block C. Skype
C. Sound block D. Zoom
D. Control block
37. All are examples of spreadsheet application
32. Overused or improper usage of computer programs except …………….
can result in the following except A. Visi Calc
B. Super calc
A. Sleep deprivation and dizziness. C. Ability spreadsheet
B. Pain in the waist, back bone, etc. D. Apple page
C. Eye irritation, poor sight
D. Fainting
38. The block-based visual programming A. Mechanical mouse
language and online community targeted B. Optical mouse
primarily at children which is used to create C. Laser mouse
D. Cord mouse
online projects using a block-like interface is
called …………………….
40. The area where you can drag and
A. Scratch
manipulate blocks of code to make your
B. Google meet
Scratch project is termed as ……………...
C. MSN Encarta
A. Sprite area
D. Google classroom
B. Script
C. Scri pt area
39. All are the main types of computer mouse
D. Block area
except …………………..

END OF PAPER

You might also like