2025 Bece Computing Questions Answered Objectives Computing Class
2025 Bece Computing Questions Answered Objectives Computing Class
COMPUTING 1 & 2
Join
on Telegram
us follow on
Youtube
[60 marks]
This paper is in two sections: A and B. Answer Question 1 in Section A and any other three
questions in Section B.
Answer all the questions in the spaces provided in this question paper. At the end of the
examination, you should submit the entire question paper to the invigilator.
Any candidate who tears off any part of the question paper will be severely penalized.
Whether you answer all the questions in this paper or not, hand in the entire question paper
to the invigilator.
Credit will be given for clarity of expression and orderly presentation of material.
SECTION A
[24 marks]
Answer Question 1.
[Compulsory]
1. As a computing student, you are to program a robot to assist your colleagues to buy
stationery from a shop. The sequence of activities undertaken to buy the stationery at
the shop is as follows:
[10 marks]
(b) Suggest three modes of payment the students could use to pay the cashier.
(i) .............................................................................................................................................
(ii) .............................................................................................................................................
(iii) .............................................................................................................................................
[3 marks]
…...............................................................................................................................................
…...............................................................................................................................................
……...........................................................................................................................................
...................................................................................................................................................
[3 marks]
(d) Assume that there are four cashiers at the shop, and each of them uses a computer which
is not worked for their work. Draw a well labelled diagram to illustrate two network
topologies that could be used to network the computers.
(i)
[3 marks]
(ii)
[2 marks]
(e) Kofi, a student in your school visited the stationery shop for two days and his expenditure
at the shop is as follows:
On Monday, he bought 4 exercise books for Gh¢ 60.00. On Tuesday, he bought 6 pens for
Gh¢ 40.00.
(i) Complete the Microsoft Excel worksheet using Kofi’s two days expenditure at the
stationery shop as shown in Figure 1.
Figure 1
[2 marks]
(ii) Write a formula in Microsoft Excel to compute Kofi’s total amount spent for the two
days at the stationery shop.
…...............................................................................................................................................
…...............................................................................................................................................
[2 marks]
SECTION B
[36 marks]
…......................................................................................................................................
…......................................................................................................................................
…......................................................................................................................................
…......................................................................................................................................
…......................................................................................................................................
[3 marks]
(b) Most companies use data entry devices that capture machine-readable data
directly into the computer system without using the keyboard.
List three of such data entry devices.
(i) …....................................................................................................................
(ii) …....................................................................................................................
(iii) …....................................................................................................................
[3 marks]
(c) A student is planning to compress a file on a computer so that it can be sent to a friend
through e-mail.
Suggest two techniques that can be used to compress the file.
(i) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
[2 marks]
(ii) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
[2 marks]
(d) A student complained of eye strain due to prolonged use of the computer.
State two possible ways to prevent the problem.
(i) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
…………………………………………………………………………………………………
(ii) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[4 marks]
3. (a) Outline the steps on how to make the word "Computing" in a Word processing
document a hyperlink to the website address www.wacegh.org.
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
[6 marks]
(b) In designing a presentation, shapes allow the user to create complex objects on the slide.
List two categories in which objects found under the shape tool are grouped.
(i) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
…………………………………………………………………………………………………
(ii) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[2 marks]
(c) A Microsoft Publisher assignment requires that texts are written over an image on a
flyer.
Outline the steps to accomplish the assignment.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[4 marks]
4. (a) State one of the data communication models for networks.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[2 marks]
(b) Social media sites were created for friendships, learning, entertainment and other
purposes.
List two of the sites used for video-sharing.
(i) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
(ii) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
[2 marks]
(c) Outline two of the key principles governing information security.
(i) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
(ii) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
[2 marks]
(d) Describe how the following search techniques are used to search for information on the
Internet:
(i) AND;
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
(ii) OR;
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[4 marks]
(b) In the real-world environment, outline two applications of robotics in each of the
following areas:
(i) Education
(α)……………………………………………………………………………………………
(β)……………………………………………………………………………………………
(ii) Transportation
(α)……………………………………………………………………………………………
(β)……………………………………………………………………………………………
[2 marks]
(c) A school’s robotic club is to construct a robot to be shown during a robotic exhibition
organized by the District Education Office.
List two components of the robot to be constructed.
(i) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
(ii) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
[2 marks]
(ii) ……………………………………………………………………………………………..
…………………………………………………………………………………………………
[2 marks]
12. Robotic systems have components 18. A user intends to create and
that relate to the functioning of human customize diagrams in Microsoft
organs. The component of the robot that PowerPoint for a presentation. The best
acts like the human brain is the: feature to help achieve the task is:
A. Motors A. Charts
B. Sensors B. Shapes
C. Batteries C. WordArt
D. Controllers D. SmartArt
14. A customer gave a new laptop to a 20. The purpose of the IF function in
technician to set accounts on Windows Microsoft Excel application is to:
that is required to make changes to all A. calculate the average of a range of cells
system settings. The best account type to B. manipulate text from multiple cells into
advise the technician to consider is: one cell
A. Guest C. perform a logical test and return a
B. Remote value for a condition
C. Standard D. return the value from a specified row
D. Administrator and column intersection
15. JHS students were given a project by 21. What value will the Microsoft Excel
their computing teacher to create a function =COUNT(A1:A10) return?
virtual museum for the storage of A. 1
electronic artifacts. The possible tool for B. 9
this assignment is: C. 10
A. Cloud computing D. 11
B. Social networking
C. Augmented reality 22. At the Internet café, Kofi connected
D. Artificial intelligence his laptop to the Internet without using
a cable, and Akua connected her laptop
16. The Secretary to the Parliament of using a cable. An example of Akua’s
Ghana sits on an ergonomic chair to connection type is:
work in the office because it: A. Infrared
A. Ensures proper sitting arrangements B. Bluetooth
B. Makes the workplace look attractive C. Wi-Fi adaptor
C. Aligns the chairs properly with the D. Ethernet adaptor
workstation
D. Promotes proper body alignment and
support
23. The computing teacher advised the 29. A quiz master asked participants to
students that studying computer complete the statement: "While the
networking provides entrepreneurial download folder is the default location
opportunities. Which statement justifies for downloaded files, the 'My
this advice? Documents' folder is the default location
A. Offering consulting services for documents ______."
B. Developing video games online A. just printed
C. Creating social media platforms B. to be saved
D. Designing smartphone Apps for schools C. just worked on
D. to be worked on
24. After replacing his old smartphone,
Muba cannot access most saved 30. The term multimedia is widely used
contacts. His friend advised saving in computing. What is the function of a
contacts in an email environment. The multimedia feature in Word processing
feature for this is: applications?
A. draft A. It converts texts into audio formats
B. folders B. It translates texts into different
C. attach files languages
D. address book C. It removes images from word
documents
25. In a computing class, a video showed D. It adds interactive elements like
a user gaining unauthorized access to an buttons and links
organization’s computer system. This
act is termed: 31. In a group presentation, the first
A. hacking step to insert an online video into a slide
B. encryption is to click on the:
C. cyberbully A. Insert tab
D. authentication B. Design tab
C. Online video
26. An entry on a blog that contains D. Download video
texts, images, or multimedia content is
called a: 32. A designer reminds staff to use
A. post templates in Desktop Publishing
B. name because they:
C. status A. create documents in unique ways
D. account B. provide a starting point for document
design
27. A programmer uses a good C. decorate the document for distribution
algorithm to write software. The D. allow users to print their work
algorithm is characterized by the
following EXCEPT: 33. The most appropriate chart to
A. efficiency represent how a man shared his
B. simplicity property among family members is a:
C. correctness A. pie chart
D. complexity B. bar chart
C. line chart
28. Robots are used in many areas of D. scatter chart
society. An example of their application
is:
A. virtual reality
B. machine learning
C. artificial intelligence
D. autonomous vehicles
34. The correct syntax of the IF function 37. Pseudocode is best described as a:
in Microsoft Excel is: A. compiled programming code
A. =IF(logical_test, [value_if_true], B. structured programming symbol
[value_if_false]) C. flowchart decision using symbols
B. =IF(logical_test, [value_if_true], D. step-by-step program outline in
[value_if_false]) informal language
C. =IF(logical_test, ([value_if_true]),
([value_if_false])) 38. The hexadecimal number A2
D. =IF(logical_test, TRUE converted to binary is:
([value_if_true]), FALSE A. 10000110
([value_if_true])) B. 10100010
C. 10010001
35. To send pictures via email (which D. 10001010
students struggle with), the most
appropriate email feature is: 39. A programmer has indented the code
A. compose in a program being written. The
B. categorize purpose of indentation is to:
C. attach files A. make the code difficult to read by users
D. draft messages B. hide the code from others when writing
it
36. The first step to create a blog for a C. create bugs in the program to disturb
school assignment is to: the codes
A. pick the blog name and niche D. show the start and end of a
B. display advertisements conditional statement
C. provide consulting services
D. determine products to sell 40. The role of neural networks in
Artificial Intelligence in modern
technology is to:
A. control robots within their environment
for work and safety
B. enhance Internet speed for fast
movements of the robots
C. create computer viruses for robots to
find solutions to them
D. simulate human brain function for
learning and problem-solving
END OF PAPER