0% found this document useful (0 votes)
57 views6 pages

Super Mock B Computing Questions

Is a BECE mock past questions from Super mock which can help students to be able to know how the Trent of questions looks like and how to solve them
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views6 pages

Super Mock B Computing Questions

Is a BECE mock past questions from Super mock which can help students to be able to know how the Trent of questions looks like and how to solve them
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

EDUCATION-NEWS CONSULT Name: ......................................................... .......

2024 SUPER BECE MOCK (B)


COMPUTING 1&2 Index Number: .................................................
2 HRS

EDUCATION-NEWS CONSULT – 0550360658

SPECIAL PERFORMANCE BOOSTER

JUNE 2024 COMPUTING 2 HRS


Do not open this booklet until you are told to do so. While you are waiting, read and observe
the following instructions carefully. Write your name and index number in ink in the spaces
provided above.
This booklet consists of two papers; I and II. Answer Paper 2 which comes first in your
answer booklet and Paper 1 on your Objective Test answer sheet. Paper 2 will last for 1 hour
and 15 mins after which the answer book let will be collected. Do not start Paper until you
are told to do so. Paper 1 will last 45 minutes.

VERY IMPORTANT INSTRUCTIONS


1. Read through the questions, brainstorm and plan your answers before you finally answer
them. This is one of the good ways to manage your time in an exam and to do well.
2. Write clearly, use simple expressions and provide the best answers possible.
3. Write answers that provide additional information. If you just list answers or provide one
to three worded answers, your will fail the paper.
4. Do well to explain your answers to help earn full marks. Check your units of measurement,
spellings, grammar and read over your work before submitting.
5. Write question numbers boldly, start the answers to every new major question on a new
page.
6. Do not rewrite the full question before answering. Only write the question number.
7. Show workings in all instances in section B if the question involves calculations.
PAPER 2
[60 MARKS] 1 HOUR
This paper is in two sections A and B. Answer Question I on Section A and any other three
questions in Section B. Answer all the questions in your answer booklet.

SECTION A
[24 MARKS]
Answer Question 1
[Compulsory]
1. a. Agyekum an IT specialist has visited your school as part of your teacher’s effort to teach
you practical IT lessons through a professionals in the field. When Mr. Agyekum entered your
classes the images labeled A-D were boldly printed on his T-shirt. You identified them as
typologies.

i. Identify the topologies labelled A, B, C and D (4 marks)


ii. State one feature each of the diagrams labeled above. (4 marks)

b. i. At the back of Mr. Agyekum’s T-shirt when he turned to write on the board were the
imaged below. Provide the names of the cloud storage platforms below. (3 marks)

ii. State three threats causes of data corruption based on the above (3 marks)
iii. Give three functions of the transport layer in the Open System Interconnection (OSI)
model. (6 marks)
iv. You have learned information security is very important but how would you explain it to a
basic 4 learner? (2 marks)
v. State two features of the Charms bar. (2 marks)

SECTION B
[36 MARKS]
Answer three questions only from this section.

2. a. Just as we live out footprints in the sand at the beach, we also live our digital footprints on
the internet. How will you explain digital footprint to your grandmother?
(2 marks)
b. Explain the following types of digital footprint to your grandmother who is excited about
term.
i. Passive
ii. Active (4 marks)
c. i. List any four Artificial Intelligence software. (4 marks)
ii. Write down the procedure for resizing a picture in PowerPoint. (2 marks)

3. a. i. John is a student in grade 8 who loves playing video games. One day, he learned that the
games he enjoys are created using something called a programming language. Curious, John
decided to research what a programming language is. Based on John's research, explain what
a programming language is in your own words. (2 marks)
ii. State three uses of programming language. (3 marks)

b. i. Define social media sites. (2 marks)


ii. Outline three benefits of video sharing sites. (3 marks)
c. I want to look for some useful information from two search engines. Which ones will you
recommend? (2 marks)

4. a. i. You are a student working on a computer project. Your teacher has asked you to save
your project files with the correct file extensions. What is a file extension? (2 marks)
ii. Give three importance of file extensions. (3 marks)
b. i. State two advantages of AI. (2 marks)
ii. Outline three requirements of a broader work environment. (3 marks)
c. List any two types of printers. (2 marks)

5. a. Mr. Mensah gave an assignment to the students to research and write down four
characteristics of the fifth generation of computers. Imagine you are one of the students in his
class. Write down four characteristics of the fifth generation of computers. (4 marks)
b. i. Give three ways of reducing the heat of a printer. (3 marks)
ii. List three wearable display technologies. (3 marks)
c. State the uses of the following MS Excel functions.
i. MAX
ii. AVERAGE (2 marks)

PAPER 1
OBJECTIVE TEST
Answer all questions.

Each question is followed by four options lettered A to D. Find out the correct option for each
question and shade in pencil on your answer sheet the answer space which bears the same
letter as the option you have chosen. Give only one answer to each question.

1. What is a component of a computer system 2. Which of the following is an input device?


that stores data and programs for future use? a) Printer
a) CPU b) Keyboard
b) RAM c) Monitor
c) Hard drive d) Speaker
d) Monitor
3. What technology allows people to b) Radio
communicate and share information over c) Internet
long distances? d) Telephone
a) Telephone
b) Television 10.Which of the following is a social media
c) Internet platform?
d) Radio a) Microsoft Excel
b) Twitter
4. Which of the following is an example of c) Adobe Photoshop
productivity software? d) AutoCAD
a) Photoshop
b) Microsoft Word 11.What is the primary concern of health and
c) Adobe Acrobat safety in the use of ICT tools?
d) Google Chrome a) Protecting personal information
b) Preventing physical injuries
5. What type of software is used to create c) Avoiding computer viruses
slideshows for presentations? d) Ensuring software compatibility
a) Spreadsheet software
b) Word processing software 12.Which of the following is an example of
c) Presentation software information security measure?
d) Database software a) Using strong passwords
b) Leaving computers unlocked
c) Sharing login credentials
6. Which of the following is used to create d) Ignoring software updates
flyers, brochures, and newsletters?
a) Presentation software 13.What technology allows computers to
b) Spreadsheet software understand and process human-like
c) Desktop publishing software intelligence?
d) Word processing software a) Robotics
b) Artificial intelligence
7. What type of software is commonly used for c) Algorithm
organizing and analyzing data? d) Web technologies
a) Presentation software
b) Desktop publishing software 14.What is the process of breaking down a
c) Spreadsheet software problem into smaller, more manageable parts?
d) Word processing software a) Computational thinking
b) Algorithm
8. Which of the following is an example of a c) Artificial intelligence
communication network? d) Robotics
a) LAN (Local Area Network)
b) CPU (Central Processing Unit) 15.Which of the following is a characteristic of a
c) RAM (Random Access Memory) good algorithm?
d) HDD (Hard Disk Drive) a) Complexity
b) Efficiency
9. What technology allows users to access c) Length
information and communicate with others d) Colorfulness
worldwide?
a) Television
16.What field of study focuses on creating
machines that can perform tasks that require 23.What is the term for the rules and
human intelligence? procedures used to securely transmit data over
a) Robotics a network?
b) Computational thinking a) Encryption
c) Artificial intelligence b) Authentication
d) Web technologies c) Protocol
d) Firewall
17.Which of the following is an example of a 24.Which of the following is an example of a
web technology? social media platform?
a) Java a) Instagram
b) Python b) Microsoft Word
c) C++ c) Adobe Acrobat
d) Ruby d) AutoCAD

18.What technology allows computers to 25.What technology allows computers to mimic


connect and communicate with each other? human behavior and intelligence?
a) Internet a) Artificial intelligence
b) Social media b) Robotics
c) Information security c) Algorithm
d) Web technologies d) Computational thinking

19.What is the main purpose of a firewall? 26.What is the process of arranging data into
a) Protecting against physical damage rows and columns to perform calculations?
b) Preventing unauthorized access to a network a) Word processing
c) Speeding up internet connection b) Desktop publishing
d) Filtering spam emails c) Spreadsheet
d) Presentation
20.What is the term for the process of encoding
data to prevent unauthorized access? 27.Which of the following is a feature of
a) Decryption presentation software?
b) Encryption a) Creating budgets
c) Authentication b) Editing photos
d) Authorization c) Making slideshows
d) Writing letters
21.What type of software is used to create and
edit text documents? 28.What is the term for the design and layout of
a) Spreadsheet software printed materials?
b) Presentation software a) Word processing
c) Word processing software b) Desktop publishing
d) Desktop publishing software c) Spreadsheet
d) Presentation
22.Which of the following is a popular web
browser? 29.What type of software is used to create
a) Microsoft Excel charts and graphs?
b) Google Chrome a) Word processing
c) Adobe Photoshop b) Desktop publishing
d) AutoCAD c) Spreadsheet
d) Presentation b) Microsoft Excel
c) Adobe Photoshop
30.What is the main purpose of a computer d) AutoCAD
network?
a) Sharing resources and information 36.What is the term for a sequence of
b) Playing games instructions designed to perform a specific task?
c) Writing letters a) Algorithm
d) Editing photos b) Firewall
31.What technology allows users to access the c) Encryption
internet wirelessly? d) Authentication
a) LAN
b) WAN 37.Which of the following is a benefit of
c) Wi-Fi computational thinking?
d) Bluetooth a) Increased creativity
b) Decreased problem-solving skills
32.Which of the following is a potential risk of c) Limited imagination
using social media? d) Enhanced logical reasoning
a) Increased productivity 38.What technology allows computers to
b) Identity theft interact with the physical world?
c) Improved communication a) Artificial intelligence
d) Enhanced creativity b) Robotics
c) Algorithm
33.What is the process of converting plaintext d) Computational thinking
into ciphertext?
a) Decryption 39.What is the term for the process of finding
b) Encryption errors in computer programs?
c) Authentication a) Debugging
d) Authorization b) Encrypting
c) Authorizing
34.What is the purpose of a search engine? d) Decomposing
a) Sending emails
b) Browsing social media 40. All the following are examples of physical
c) Finding information on the internet data treats except ........
d) Editing photos a) data theft
b) spyware
35.Which of the following is an example of c) fire
artificial intelligence? d) lightning
a) Siri

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy