Super Mock B Computing Questions
Super Mock B Computing Questions
SECTION A
[24 MARKS]
Answer Question 1
[Compulsory]
1. a. Agyekum an IT specialist has visited your school as part of your teacher’s effort to teach
you practical IT lessons through a professionals in the field. When Mr. Agyekum entered your
classes the images labeled A-D were boldly printed on his T-shirt. You identified them as
typologies.
b. i. At the back of Mr. Agyekum’s T-shirt when he turned to write on the board were the
imaged below. Provide the names of the cloud storage platforms below. (3 marks)
ii. State three threats causes of data corruption based on the above (3 marks)
iii. Give three functions of the transport layer in the Open System Interconnection (OSI)
model. (6 marks)
iv. You have learned information security is very important but how would you explain it to a
basic 4 learner? (2 marks)
v. State two features of the Charms bar. (2 marks)
SECTION B
[36 MARKS]
Answer three questions only from this section.
2. a. Just as we live out footprints in the sand at the beach, we also live our digital footprints on
the internet. How will you explain digital footprint to your grandmother?
(2 marks)
b. Explain the following types of digital footprint to your grandmother who is excited about
term.
i. Passive
ii. Active (4 marks)
c. i. List any four Artificial Intelligence software. (4 marks)
ii. Write down the procedure for resizing a picture in PowerPoint. (2 marks)
3. a. i. John is a student in grade 8 who loves playing video games. One day, he learned that the
games he enjoys are created using something called a programming language. Curious, John
decided to research what a programming language is. Based on John's research, explain what
a programming language is in your own words. (2 marks)
ii. State three uses of programming language. (3 marks)
4. a. i. You are a student working on a computer project. Your teacher has asked you to save
your project files with the correct file extensions. What is a file extension? (2 marks)
ii. Give three importance of file extensions. (3 marks)
b. i. State two advantages of AI. (2 marks)
ii. Outline three requirements of a broader work environment. (3 marks)
c. List any two types of printers. (2 marks)
5. a. Mr. Mensah gave an assignment to the students to research and write down four
characteristics of the fifth generation of computers. Imagine you are one of the students in his
class. Write down four characteristics of the fifth generation of computers. (4 marks)
b. i. Give three ways of reducing the heat of a printer. (3 marks)
ii. List three wearable display technologies. (3 marks)
c. State the uses of the following MS Excel functions.
i. MAX
ii. AVERAGE (2 marks)
PAPER 1
OBJECTIVE TEST
Answer all questions.
Each question is followed by four options lettered A to D. Find out the correct option for each
question and shade in pencil on your answer sheet the answer space which bears the same
letter as the option you have chosen. Give only one answer to each question.
19.What is the main purpose of a firewall? 26.What is the process of arranging data into
a) Protecting against physical damage rows and columns to perform calculations?
b) Preventing unauthorized access to a network a) Word processing
c) Speeding up internet connection b) Desktop publishing
d) Filtering spam emails c) Spreadsheet
d) Presentation
20.What is the term for the process of encoding
data to prevent unauthorized access? 27.Which of the following is a feature of
a) Decryption presentation software?
b) Encryption a) Creating budgets
c) Authentication b) Editing photos
d) Authorization c) Making slideshows
d) Writing letters
21.What type of software is used to create and
edit text documents? 28.What is the term for the design and layout of
a) Spreadsheet software printed materials?
b) Presentation software a) Word processing
c) Word processing software b) Desktop publishing
d) Desktop publishing software c) Spreadsheet
d) Presentation
22.Which of the following is a popular web
browser? 29.What type of software is used to create
a) Microsoft Excel charts and graphs?
b) Google Chrome a) Word processing
c) Adobe Photoshop b) Desktop publishing
d) AutoCAD c) Spreadsheet
d) Presentation b) Microsoft Excel
c) Adobe Photoshop
30.What is the main purpose of a computer d) AutoCAD
network?
a) Sharing resources and information 36.What is the term for a sequence of
b) Playing games instructions designed to perform a specific task?
c) Writing letters a) Algorithm
d) Editing photos b) Firewall
31.What technology allows users to access the c) Encryption
internet wirelessly? d) Authentication
a) LAN
b) WAN 37.Which of the following is a benefit of
c) Wi-Fi computational thinking?
d) Bluetooth a) Increased creativity
b) Decreased problem-solving skills
32.Which of the following is a potential risk of c) Limited imagination
using social media? d) Enhanced logical reasoning
a) Increased productivity 38.What technology allows computers to
b) Identity theft interact with the physical world?
c) Improved communication a) Artificial intelligence
d) Enhanced creativity b) Robotics
c) Algorithm
33.What is the process of converting plaintext d) Computational thinking
into ciphertext?
a) Decryption 39.What is the term for the process of finding
b) Encryption errors in computer programs?
c) Authentication a) Debugging
d) Authorization b) Encrypting
c) Authorizing
34.What is the purpose of a search engine? d) Decomposing
a) Sending emails
b) Browsing social media 40. All the following are examples of physical
c) Finding information on the internet data treats except ........
d) Editing photos a) data theft
b) spyware
35.Which of the following is an example of c) fire
artificial intelligence? d) lightning
a) Siri