0% found this document useful (0 votes)
1K views12 pages

2025 Bece Computing Questions Answered Objectives Computing Class

The document is an examination paper for the Basic Education Certificate Examination in Computing for 2025, consisting of two sections with various questions. Section A is compulsory and includes tasks such as programming a robot, drawing flowcharts, and using Microsoft Excel, while Section B contains additional questions on topics like perceptual computing and information security. The paper emphasizes clarity of expression and orderly presentation, and candidates must submit the entire question paper at the end of the examination.

Uploaded by

noris2addison
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views12 pages

2025 Bece Computing Questions Answered Objectives Computing Class

The document is an examination paper for the Basic Education Certificate Examination in Computing for 2025, consisting of two sections with various questions. Section A is compulsory and includes tasks such as programming a robot, drawing flowcharts, and using Microsoft Excel, while Section B contains additional questions on topics like perceptual computing and information security. The paper emphasizes clarity of expression and orderly presentation, and candidates must submit the entire question paper at the end of the examination.

Uploaded by

noris2addison
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

2&1

JUNE, 2025 CANDIDATES NAME


COMPUTING
(RETYPED)

This information is the solely owned INDEX NUMBER SIGNATURE


by the West African Examination
Council(WAEC) to be used for
Education Purposes Only

BASIC EDUCATION CERTIFICATE EXAMINATION


2025 EDITION

COMPUTING 1 & 2
Join

Computing Class with Smile It Off

on Telegram
us follow on

Youtube
[60 marks]

This paper is in two sections: A and B. Answer Question 1 in Section A and any other three
questions in Section B.

Answer all the questions in the spaces provided in this question paper. At the end of the
examination, you should submit the entire question paper to the invigilator.

Any candidate who tears off any part of the question paper will be severely penalized.

Whether you answer all the questions in this paper or not, hand in the entire question paper
to the invigilator.

Credit will be given for clarity of expression and orderly presentation of material.

SECTION A
[24 marks]

Answer Question 1.
[Compulsory]

1. As a computing student, you are to program a robot to assist your colleagues to buy
stationery from a shop. The sequence of activities undertaken to buy the stationery at
the shop is as follows:

Go to the stationery shop;


Select the needed stationery;
Check the price of the selected stationery;
Go to the cash counter;
Pay money to the cashier;
Take the stationery along;
Leave the shop.
(a) Draw a flowchart using the sequence of activities.

[10 marks]
(b) Suggest three modes of payment the students could use to pay the cashier.

(i) .............................................................................................................................................

(ii) .............................................................................................................................................

(iii) .............................................................................................................................................

[3 marks]

(c) Describe one of the modes of payment suggested in 1(b).


…...............................................................................................................................................

…...............................................................................................................................................
…...............................................................................................................................................

……...........................................................................................................................................

...................................................................................................................................................

[3 marks]

(d) Assume that there are four cashiers at the shop, and each of them uses a computer which
is not worked for their work. Draw a well labelled diagram to illustrate two network
topologies that could be used to network the computers.
(i)

[3 marks]

(ii)

[2 marks]
(e) Kofi, a student in your school visited the stationery shop for two days and his expenditure
at the shop is as follows:
On Monday, he bought 4 exercise books for Gh¢ 60.00. On Tuesday, he bought 6 pens for
Gh¢ 40.00.

(i) Complete the Microsoft Excel worksheet using Kofi’s two days expenditure at the
stationery shop as shown in Figure 1.

Figure 1

[2 marks]

(ii) Write a formula in Microsoft Excel to compute Kofi’s total amount spent for the two
days at the stationery shop.

…...............................................................................................................................................

…...............................................................................................................................................

[2 marks]

SECTION B
[36 marks]

Answer three questions only from this section.

2. (a) Explain the concept of perceptual computing to colleagues in the computing


club.

…......................................................................................................................................
…......................................................................................................................................

…......................................................................................................................................

…......................................................................................................................................

…......................................................................................................................................

[3 marks]

(b) Most companies use data entry devices that capture machine-readable data
directly into the computer system without using the keyboard.
List three of such data entry devices.
(i) …....................................................................................................................
(ii) …....................................................................................................................
(iii) …....................................................................................................................
[3 marks]

(c) A student is planning to compress a file on a computer so that it can be sent to a friend
through e-mail.
Suggest two techniques that can be used to compress the file.
(i) ……………………………………………………………………………………………..

…………………………………………………………………………………………………

[2 marks]

(ii) ……………………………………………………………………………………………..

…………………………………………………………………………………………………

[2 marks]

(d) A student complained of eye strain due to prolonged use of the computer.
State two possible ways to prevent the problem.
(i) ……………………………………………………………………………………………..

…………………………………………………………………………………………………

…………………………………………………………………………………………………
(ii) ……………………………………………………………………………………………..
…………………………………………………………………………………………………

…………………………………………………………………………………………………

[4 marks]

3. (a) Outline the steps on how to make the word "Computing" in a Word processing
document a hyperlink to the website address www.wacegh.org.

……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
[6 marks]
(b) In designing a presentation, shapes allow the user to create complex objects on the slide.
List two categories in which objects found under the shape tool are grouped.

(i) ……………………………………………………………………………………………..

…………………………………………………………………………………………………

…………………………………………………………………………………………………

(ii) ……………………………………………………………………………………………..

…………………………………………………………………………………………………
…………………………………………………………………………………………………

[2 marks]

(c) A Microsoft Publisher assignment requires that texts are written over an image on a
flyer.
Outline the steps to accomplish the assignment.
…………………………………………………………………………………………………

…………………………………………………………………………………………………
…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

[4 marks]
4. (a) State one of the data communication models for networks.

…………………………………………………………………………………………………

…………………………………………………………………………………………………

[2 marks]

(b) Social media sites were created for friendships, learning, entertainment and other
purposes.
List two of the sites used for video-sharing.

(i) ……………………………………………………………………………………………..

…………………………………………………………………………………………………

(ii) ……………………………………………………………………………………………..

…………………………………………………………………………………………………

[2 marks]
(c) Outline two of the key principles governing information security.

(i) ……………………………………………………………………………………………..

…………………………………………………………………………………………………

(ii) ……………………………………………………………………………………………..
…………………………………………………………………………………………………

[2 marks]

(d) Describe how the following search techniques are used to search for information on the
Internet:

(i) AND;

………………………………………………………………………………………

………………………………………………………………………………………

………………………………………………………………………………………

………………………………………………………………………………………

………………………………………………………………………………………
………………………………………………………………………………………

(ii) OR;

………………………………………………………………………………………

………………………………………………………………………………………

………………………………………………………………………………………

………………………………………………………………………………………

………………………………………………………………………………………
………………………………………………………………………………………

5. (a) Covert 100102to a decimal number.

…………………………………………………………………………………………………
…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

…………………………………………………………………………………………………

[4 marks]
(b) In the real-world environment, outline two applications of robotics in each of the
following areas:
(i) Education

(α)……………………………………………………………………………………………

(β)……………………………………………………………………………………………

(ii) Transportation

(α)……………………………………………………………………………………………

(β)……………………………………………………………………………………………
[2 marks]

(c) A school’s robotic club is to construct a robot to be shown during a robotic exhibition
organized by the District Education Office.
List two components of the robot to be constructed.
(i) ……………………………………………………………………………………………..

…………………………………………………………………………………………………

(ii) ……………………………………………………………………………………………..

…………………………………………………………………………………………………
[2 marks]

(d) Artificial Intelligence is the ability of a computer or computer-controlled robots to


perform tasks like human beings.
List two abilities that make the computers or computer-controlled robots intelligent.
(i) ……………………………………………………………………………………………..
…………………………………………………………………………………………………

(ii) ……………………………………………………………………………………………..

…………………………………………………………………………………………………
[2 marks]

END OF ESSAY TEST


SECTION A
OBJECTIVES
[40 marks]
1. Computers have become smaller, 6. After the computing class, a colleague
faster, and more reliable due to the use approached you to further explain to
of microprocessor in the him how to reference a worksheet cell in
A. second generation Microsoft Excel. In the explanation, you
B. third generation mentioned that, to reference a cell, one
C. fourth generation needs to use the cell
D. fifth generation A. value
B. address
2. The graphic tablet is a kind of device C. content
used to capture D. function
A. RFID signals
B. QR code scans 7. Bello formatted a Microsoft Excel
C. magnetic card data worksheet:
D. handwriting, drawings and inputs Cells with different colours based on
specific conditions and it was very
3. To make teaching and learning of beautiful. Which of the given features can
computing more interactive, the teacher a student use to achieve the same results as
intends to demonstrate an activity by Bello?
showing diagrams, images and videos on A. Conditional sorting
a large screen in the classroom. The B. Conditional filtering
most appropriate device to achieve this C. Conditional validation
objective by the teacher is a D. Conditional formatting
A. printer
B. plotter 8. Which of the following terminologies
C. monitor is associated with computer network?
D. projector A. Junk
B. Trojan
4. The purpose of a storage device in a C. Firewall
computer system is for D. Defragmenter
A. keeping and retrieving data
B. displaying graphic elements 9. Zalia is very good at posting her
C. executing computer programs pictures and location of wherever she
D. connecting devices to the Internet goes on her social media platforms for
her friends to see. The potential risk
5. A school prefect approached the associated with Zalia’s activities online
computing club to guide him in is:
designing a presentation using Microsoft A. Identity theft
PowerPoint. The prefect intends to B. Learning difficulties
practice the presentation and record the C. Strengthening friendships
time spent for each slide to make his D. Building a professional network
presentation run smoothly. The best
feature the computing club will suggest 10. Surfing the Internet requires the use
to the prefect is of search engines, which are designed to
A. presenter notes help users find:
B. presenter feature A. Information on the Internet
C. rehearse feature B. Information from e-mail messages
D. rehearse timings C. Information from the computer hard
disk drive
D. Information from files and folders on
the computer
11. In the concept of programming, a 17. Text formatting options in Word
comment in a program code is used to: processing applications include:
A. Explain portions of the code A. Subscript
B. Make the program run faster B. Underline
C. Change the output of the program C. Superscript
D. Temporarily remove a line of code D. Strikethrough

12. Robotic systems have components 18. A user intends to create and
that relate to the functioning of human customize diagrams in Microsoft
organs. The component of the robot that PowerPoint for a presentation. The best
acts like the human brain is the: feature to help achieve the task is:
A. Motors A. Charts
B. Sensors B. Shapes
C. Batteries C. WordArt
D. Controllers D. SmartArt

13. The most powerful technological 19. In a Desktop Publishing project


innovation made during the work, a student’s work contained more
development of the fifth-generation text than it can display. This situation is
computers was the use of: best described as:
A. Vacuum tubes A. layout
B. Integrated circuits B. template
C. VLSI microprocessors C. overflow
D. ULSI microprocessors D. alignment

14. A customer gave a new laptop to a 20. The purpose of the IF function in
technician to set accounts on Windows Microsoft Excel application is to:
that is required to make changes to all A. calculate the average of a range of cells
system settings. The best account type to B. manipulate text from multiple cells into
advise the technician to consider is: one cell
A. Guest C. perform a logical test and return a
B. Remote value for a condition
C. Standard D. return the value from a specified row
D. Administrator and column intersection

15. JHS students were given a project by 21. What value will the Microsoft Excel
their computing teacher to create a function =COUNT(A1:A10) return?
virtual museum for the storage of A. 1
electronic artifacts. The possible tool for B. 9
this assignment is: C. 10
A. Cloud computing D. 11
B. Social networking
C. Augmented reality 22. At the Internet café, Kofi connected
D. Artificial intelligence his laptop to the Internet without using
a cable, and Akua connected her laptop
16. The Secretary to the Parliament of using a cable. An example of Akua’s
Ghana sits on an ergonomic chair to connection type is:
work in the office because it: A. Infrared
A. Ensures proper sitting arrangements B. Bluetooth
B. Makes the workplace look attractive C. Wi-Fi adaptor
C. Aligns the chairs properly with the D. Ethernet adaptor
workstation
D. Promotes proper body alignment and
support
23. The computing teacher advised the 29. A quiz master asked participants to
students that studying computer complete the statement: "While the
networking provides entrepreneurial download folder is the default location
opportunities. Which statement justifies for downloaded files, the 'My
this advice? Documents' folder is the default location
A. Offering consulting services for documents ______."
B. Developing video games online A. just printed
C. Creating social media platforms B. to be saved
D. Designing smartphone Apps for schools C. just worked on
D. to be worked on
24. After replacing his old smartphone,
Muba cannot access most saved 30. The term multimedia is widely used
contacts. His friend advised saving in computing. What is the function of a
contacts in an email environment. The multimedia feature in Word processing
feature for this is: applications?
A. draft A. It converts texts into audio formats
B. folders B. It translates texts into different
C. attach files languages
D. address book C. It removes images from word
documents
25. In a computing class, a video showed D. It adds interactive elements like
a user gaining unauthorized access to an buttons and links
organization’s computer system. This
act is termed: 31. In a group presentation, the first
A. hacking step to insert an online video into a slide
B. encryption is to click on the:
C. cyberbully A. Insert tab
D. authentication B. Design tab
C. Online video
26. An entry on a blog that contains D. Download video
texts, images, or multimedia content is
called a: 32. A designer reminds staff to use
A. post templates in Desktop Publishing
B. name because they:
C. status A. create documents in unique ways
D. account B. provide a starting point for document
design
27. A programmer uses a good C. decorate the document for distribution
algorithm to write software. The D. allow users to print their work
algorithm is characterized by the
following EXCEPT: 33. The most appropriate chart to
A. efficiency represent how a man shared his
B. simplicity property among family members is a:
C. correctness A. pie chart
D. complexity B. bar chart
C. line chart
28. Robots are used in many areas of D. scatter chart
society. An example of their application
is:
A. virtual reality
B. machine learning
C. artificial intelligence
D. autonomous vehicles
34. The correct syntax of the IF function 37. Pseudocode is best described as a:
in Microsoft Excel is: A. compiled programming code
A. =IF(logical_test, [value_if_true], B. structured programming symbol
[value_if_false]) C. flowchart decision using symbols
B. =IF(logical_test, [value_if_true], D. step-by-step program outline in
[value_if_false]) informal language
C. =IF(logical_test, ([value_if_true]),
([value_if_false])) 38. The hexadecimal number A2
D. =IF(logical_test, TRUE converted to binary is:
([value_if_true]), FALSE A. 10000110
([value_if_true])) B. 10100010
C. 10010001
35. To send pictures via email (which D. 10001010
students struggle with), the most
appropriate email feature is: 39. A programmer has indented the code
A. compose in a program being written. The
B. categorize purpose of indentation is to:
C. attach files A. make the code difficult to read by users
D. draft messages B. hide the code from others when writing
it
36. The first step to create a blog for a C. create bugs in the program to disturb
school assignment is to: the codes
A. pick the blog name and niche D. show the start and end of a
B. display advertisements conditional statement
C. provide consulting services
D. determine products to sell 40. The role of neural networks in
Artificial Intelligence in modern
technology is to:
A. control robots within their environment
for work and safety
B. enhance Internet speed for fast
movements of the robots
C. create computer viruses for robots to
find solutions to them
D. simulate human brain function for
learning and problem-solving

END OF PAPER

You might also like