0% found this document useful (0 votes)
93 views

Computing Mock 4

Computing past questions

Uploaded by

Felix Fleku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views

Computing Mock 4

Computing past questions

Uploaded by

Felix Fleku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

BECE MOCK 4 COMPUTING 2

PAPER 2
ESSAY
This paper consists of two sections: A and B. Answer question 1 in section A
and any other two questions in section B. All questions carry equal marks.
Answer all the questions in the spaces provided in this question paper.
SECTION A
[20 MARKS]
Answer Question 1 (compulsory)
1. The diagram below shows different direct data entry devices. Use them to
answer the questions that follow.

I II III

Figure 1

(a) (i) Identify the name of the devices labelled I, II, and III in Figure 1. [3 marks]
(ii) State one use of each of the devices in Figure 1. [6marks]
(iii) What is a blog? [2 marks]
(b) (i) Mention two (2) different types of printers. [2 marks]
(ii) Outline two issues associated with access to online services. [4 marks]
(c) Use the image below to answer the following questions.

Figure 2
(i) Identify the image shown in Figure 2. [1 mark]
(ii) State two features of the image in Figure 2. [2 marks]
(d) State two (2) advantages of partitioning a Hard Disk. [4 marks]

SECTION B
[36 MARKS]
Answer only three questions from this section. All questions carry equal marks
2. (a) (i) Give four examples of portable computing devices. [4 marks]

(ii) State two unique features of fifth-generation computers. [4 marks]


(b) (i) State two examples of storage devices that use flash memory. [4 marks]
3. (a) Write the following acronyms in full. [4 marks]
i. OCR ii. RFID iii. PIN iv. OMR
(b) (i) Give two uses of tables in MS Word. [2 marks]

(ii) State three differences each between HDD and SSD. [6 marks]

4. (a) State three best activities users should practice in order to prevent
computer related issues. [6 marks]
(b) (i) What are assistive technologies? [2 marks]
(iii) Give four (4) examples of assistive technologies. [4 marks]
5. (a) State two negative effects of using a smartphone. [2 marks]
(b) (i) What is file fragmentation? [2 marks] [4 marks]
(ii) State two (2) advantages of using social media.
(c) Give two (2) uses of parallel processing. [4 marks]
END OF ESSAY TEST
COMPUTING 1
PAPER 1
OBJECTIVE TEST
Answer All Questions
Each question is followed by four options lettered A to D. Find out the correct option for
each question and shade in pencil on your answer sheet the answer space which bears
the same letter as the option you have chosen. Give only one answer to each question.
1. Which of the following tools is used to get synonyms of words in PowerPoint?
A. Proofing B. Thesaurus C. Design D. Template
2. The process of creating a set of instruction that tells the computer how to perform a
task is called …… A. testing B. engineering C. programming D. tasking.
3. Which of the following should a user bypass before accessing an email? A. Gmail and
password B. Yahoo and username C. Username and password D. Computer name and
password
4. A program terminating without any information is termed as ……… A. abend B. error
C. code D. bug.
5. The step-by-step way of solving a problem in programming is termed as ………. A.
decomposition B. algorithm C. iteration D. abstraction.
6. The term used to describe the act of taking someone’s work or idea and claiming it as
your own is ……… A. copyright B. piracy C. plagiarism D. patent.
7. If the date a webpage was published is missing, the information on that webpage
lacks ……… A. currency B. coverage C. objectivity D. authority
8. Which of the following below is an example of open leaning websites? A. Facebook
B. Amazon C. Alibaba D. Coursera
9. A task that is performed in the background without the users of the software’s
awareness is termed as……… A. frontend B. backend C. compilation D. program.
10. Who is the principal architect in the development of Facebook? A. Ellon Musk
B. Mark Zuckerberg C. Bill Gates D. Reid Hoffman
11. A data type that can store up to 64bits of data is called …… A. double B. floats C.
date D. integer
12. The period of fourth generation computers was from …… A. 1940 – 1970 B. 1959 –
1965 C. 1971 – 1980 D. 1945 – 1956
13. People who write computer programs are called…. A. teachers B. programmers C.
engineers D. operators
14. “Hello” is an example of which type of data type? A. Date B. String C. Boolean D.
Data
15. Which of the following consists of one or more characters which includes letters,
numbers and other characters? A. Double B. Floats C. Integer D. String
Dim mynumber As Interger
mynumber = 5
If mynumber > 0 Then
MsgBox “The condition
evaluates to true.”
End If
16. The code above is an example of …… A. decomposition B. algorithm C. abstraction
D. iteration.
17. RSI stands for………… A. Resistance Strain Illness B. Repetitive Skull Injury C.
Resistance Stomach Illness D. Repetitive Strain Injury.
18. When a programmer hides details of a program from the user is called ……….
A. decomposition B. algorithm C. abstraction D. iteration.
19. The fourth-generation computers used the…… technology. A. integrated circuit.
B. transistor C. vacuum-tube D. microprocessor.
20. A machine programmable by a computer and capable of carrying out complex tasks
automatically is called a/an………. A. laptop B. programmer C. robot D. intelligence.
21. The type of technology used in third generation computers was A. integrated
circuits B. transistors C. vacuum tubes D. microprocessors.
22. How many types of robots do we have in design? A. 1 B. 2 C. 3 D. 4
23. What is the name or symbol used to identify manufacturers or distributors of
products and services? A. Patient B. Copyright C. Trademark D. Piracy
24. One of the reasons for using robots in schools is to ………. A. replace teachers B.
learns for students C. teach algorithms D. prevent exams failure.
25. If an e-mail message is being sent to multiple recipients, which of the following
characters is used to separate the e-mail addresses of the recipients?
A. Colon B. Semi-colon C. Full stop D. Forward slash
26. The situation whereby machines become smart and are able to solve a task
intelligently like humans is termed as………… A. machine intelligence B. natural
intelligence C. artificial intelligence D. virtual reality.
27. The physical or logical arrangement of network is……… A. topology B. routing C.
networking D. intranet.
28. Which of the following technologies is used by smart self-driving cars?
A. Machine learning
B. Neural network
C. Artificial intelligence
D. All the above
29. The use of digital visual elements to enhance the real physical world is known as ……
A. augmented reality B. virtual reality C. artificial intelligence D. artificial neural
network.
30. The button that opens a dialog box for users to create an email message is ………
A. back B. compose C. create D. refresh.
31. A humanoid robot is an example of ……..
A. mobile robot.
B. fixed robot.
C. programable robot.
D. controlled robot.
32. Computer systems that are designed to simulate how the human brain analyzes and
process information is known as……….. A. machine learning B. virtual reality C.
artificial intelligence D. artificial neural network.
33. Files or folders that are sent along with an email message is termed as……….
A. attachment B. carbon copy C. email files D. mail files.
34. Which of these is a demerit of using robots? A. They are efficient B. They are costly
C. They are safe D. They perform repetitive tasks.
35. Selecting ignore once when using the proofing option in a word processing
document will…… A. overlook all instances of the spelling error. B. overlook the current
instance of the spelling error. C. add new word to the dictionary. D. delete the spelling
error.
36. Which social media platform allows users to share small content items such as short
sentences, images or video links? A. Twitter B. Facebook C. Pinterest D. YouTube
37. The name given to each cell according to its column label and row number is called
A. cell formula B. active cell C. highlighted cell D. cell reference.
38. Any program instruction that repeats same statement is known as A.
decomposition B. algorithm C. abstraction D. iteration.
39. Identify this image. A. Joystick B. Webcam C. Light pen D. Scanner
40. In Excel, columns are labelled as A. A, B, C, D B. 1,2,3,4,5,6 C. A1, A2, A3 D. $A$1,
$A$2, $A$3
END OF PAPER

COMPUTING 2 SOLUTION
COMPUTING
PAPER 2
[60 MARKS]
Question 1
(a) (i) Identify the name of the social media icons labelled I, II, and III.
I – Optical mark recognition / Optical mark reader
II – Magnetic ink character recognition / magnetic ink character reader
III – Magnetic card reader [3 marks @1 mark each]
(ii) State one use of each of the devices in figure 1.
Uses of optical mark recognition
-OMR is utilized in healthcare for patient forms, surveys, and insurance claims. It helps in
processing and organizing large amounts of patient data quickly and accurately.
-Used to read questionnaires where responses are registered in the form of lines or
shaded areas.
-Used to read/mark answer sheets.
-Ballots with marked choices are processed using OMR technology to count votes,
ensuring accuracy
and efficiency in the electoral process
Uses of Magnetic ink character recognition
-They are used to process cheques in banking operations.
Uses of Magnetic card reader
-Magnetic card readers are used in credit and debit card machines at retail stores,
restaurants, and other businesses.
-These readers are employed in security systems to control access to buildings, rooms,
or restricted areas. [3 marks @1 mark each]
(iii) What is a blog?
A blog is a regularly updated website that is used to share news or interesting topics. [2
marks]
(b) (i) Mention two (2) different types of printers. -Inkjet printers -Laser printers -LED
printers -Braille printers -3D printers -Thermal printers, etc [2 marks @1 mark each]
(ii) Outline two issues associated with access to online services.
-Identity theft
-Cybersecurity and Privacy Concerns
-Network security
-Reliability of passwords.
-The cost of internet services and necessary devices can be prohibitive, especially for
low-income individuals or communities. [4 marks @ 2 marks each]
(c) Identify the image shown in figure 2
(i) QR-code / Quick Response Code. [2 marks]
(d) State two features of the image in Figure 2
-Three squares in the corners of the QR code.
-The QR code itself, which is embedded as a pattern and holds the information.
[2 marks @1 mark each]

Question 2
(a) (i) Give four examples of portable computing devices.
-Laptops
-Smartphone
-Tablet
-Smartwatch
-Notebook
-Palmtop, etc [4 marks @1 mark each]
(ii) State two unique features of fifth generation computers.
-They are fast and reliable.
-They are more user-friendly.
-Simpler to repair with almost no maintenance cost.
-They are versatile and useful in all areas of life.
-They are often lightweight and easy to handle.
-Readily available and accessible everywhere.
-They are of varying sizes.
-They can solve more complex problems.
-It uses Artificial Intelligence technology.
-They are more portable and powerful. [4 marks @1 mark each]
(b) State two examples of storage devices that use flash memory.
-Flash memory cards and readers
-Hybrid hard drives
-Solid state drives
-USB flash drives.
[4 marks @ 2 marks each]
Question 3
(a) Write the following acronyms in full.
i. OCR: Optical Character Recognition/Reader
ii. RFID: Radiofrequency Identification
iii. PIN: Personal Identification Number
iv. OMR: Optical Mark Recognition [4 marks @1 mark each]
(b) (i) Give two uses of tables in MS Word.
-Used in creating a publication.
-Tables are used to share information between programs.
-Tables are used to store lists of telephone numbers, clients and employee rosters.
-Used to align text, numbers and graphics. [2 marks @ 1 mark each]
(ii) Differences each between HDD and SSD.
HDD SSD
It has rotating platters and mechanical arms No moving parts
Reading and writing period is slower The reading and writing period is quicker
High energy consumption Low energy consumption
Produces sound due to moving parts Does not produce sound

[6 marks @1 marks each]

Question 4
(a) State three best activities users should practice in order to prevent computer
related issues.
-Take regular breaks while using the computer.
-Use screen protectors on monitors to reduce glare.
-Use speakers on moderate volume instead of earpiece if possible
-Set your body to straighten and be comfortable when using the computer.
-Do not overload sockets, etc. [6 marks @2 marks each]
(b) (i) What are assistive technologies?
Assistive technology is a technology used by individuals with disabilities to perform
functions that might be difficult. OR Assistive technology refers to any device,
equipment, software, or system that is designed to help people, especially those with
disabilities or limitations, perform tasks they might otherwise struggle with.
[2 marks]
(ii) Give four (4) examples of Assistive technologies.
-Screen readers
-Joysticks
-On-Screen keyboard
-Touchscreens
-Refreshable braille displays
-Text-to-speech (TTS) software and devices
-Braille embossers for printing Braille documents
-Voice-activated home assistants
-Hearing aids, etc. [4 marks @1 mark each]

Question 5
(a) State two negative effects of using a smartphone.
-Users can be addicted to it.
-Children can be exposed to nude pictures.
-Cyberbullying
-Addiction
-Information overload
-Increased health risks such as glare, etc. [2 marks @1 mark each]
(b) (i) What is file fragmentation?
File fragmentation occurs if the data for a file are scattered throughout a hard drive
platter instead of in one continuous location. OR File fragmentation occurs when a file is
stored in non-contiguous or scattered segments across a storage device, such as a hard
disk drive. [2 marks]
(ii) State two (2) advantages of using social media.
-Staying connected with family and friends worldwide.
-Quick access to information and research.
-Online learning and content discovery
-Easy to use marketing tools, etc. [4 marks @2 marks each]
(c) Give two (2) uses of parallel processing.
-It is used for real-time simulation of complex real-life processes
-It is used to create collaborative work environments.
-Parallel processing is used in databases and data mining.
-Used for conducting complex science and engineering research.
-Used in complex networking, videos and multimedia. [2 marks @1 mark each]

You might also like