0% found this document useful (0 votes)
92 views

Bece Computing 2024

Uploaded by

Daniel
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views

Bece Computing 2024

Uploaded by

Daniel
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

KUULCHAT ONLINE EDUCATIONAL RESOURCE PORTAL

KUULCHAT.COM

DOWNLOAD THE KUULCHAT APP ON EITHER APP STORE OR PLAY STORE

TO

1. SOLVE PAST/MOCK QUESTIONS, MARK YOURSELF AND SEE RESULTS, VIEW THE
MARKING SCHEME

2. DOWNLOAD PAST QUESTIONS

3. STUDY SMARTER

4. TAKE ONLINE COURSES

5. REVISE FOR YOUR TERMINAL & FINAL EXAMS


BECE

2&1
2024
COMPUTING 2 & 1
Essay and Objective

THE WEST AFRICAN EXAMINATION COUNCIL


GHANA

Basic Education Certificate Examination

COMPUTING
PAPER 2 1 ¼ hour
ESSAY
[60 marks]

This paper is in two sections: A and B. Answer Question 1 in Section A and any other three questions in
Section B.

Answer all the questions in the space provided in this question paper. At the end of the examination, you should
submit the entire question paper to the invigilator.

Any candidate who tears off any part of the question paper will be severely penalized.

Whether you answer all the questions in this paper or not, hand in the entire question paper to the invigilator.

Credit will be given for clarity of expression and orderly presentation of material.

SECTION A
[24 marks]

Answer Question 1.
[Compulsory]

1. Figure 1 shows computer users in a school’s computer laboratory.


Study the figure carefully and use it to answer questions 1(a) to 1(g).

(a) Which of the users has assumed the correct sitting posture?

………………………………………………………………………………………………
[2 marks]

(b) Prolonged use of the computer is associated with health-related problems. Suggest two possible
safety measures the users should adopt to minimize workstation risks.
(i) ………………………………………………………………………………………

………………………………………………………………………………………

(ii) ………………………………………………………………………………………

………………………………………………………………………………………
[4 marks]

(c) The users were tasked to produce a ten page document using Microsoft Word. Outline the steps to
be taken by the users to set the entire ten-page document to 2.0 line spacing.

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………
[4 marks]

(d) The users were to type a report using Microsoft Word to be presented in class. User I typed 10
pages within 3 hours, user II typed 8 pages within 4 hours, user III typed 5 pages within 6 hours
and user IV typed 6 pages within 2 hours.

Suggest two Microsoft Excel chart types that will be most appropriate to show the relationship
between the number of pages each user typed and the time spent in typing.

(i) ………………………………………………………………………………………

(ii) ………………………………………………………………………………………
[2 marks]

(e) The users have been using their computers as standalone. State two benefits they will derive when
their computers are networked.

(i) ………………………………………………………………………………………

(ii) ………………………………………………………………………………………
[4 marks]
(f) As a networking consultant, suggest two network topologies that could be used to network the
computers for the users.

(i) ………………………………………………………………………………………

(ii) ………………………………………………………………………………………
[2 marks]

(g) The following activities were given to each user to type using Microsoft Word. They were to use
Microsoft Publisher to produce a flyer with the typed document to be displayed on the notice
board of each classroom.

School routine activities


7:30 a.m. : Morning assembly
7:40 a.m. : Classes hours
9:40 a.m. : Morning break
10.00 a.m.: Classes hours
12:30 p.m. : Afternoon break
1.00 p.m. : Classes hours
2:30 p.m. : Closing

As a programming student, write an algorithm to demonstrate the activity.

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

[6 marks]
SECTION B
[36 marks]

Answer three questions only from this section

2. (a) Describe the processor of a computer to colleagues in your class.

…………………………………………………………………………………………..

…………………………………………………………………………………………..

…………………………………………………………………………………………..

…………………………………………………………………………………………..
[3 marks]

Study Figure 2 carefully and use it to answer questions 2(b) and 2(c)

(b) Write the name of the image shown in Figure 2.

…………………………………………………………………………………………
[2 marks]

(c) Describe to your colleagues, how the image shown in Figure 2 is accessed for information.

……………………………………………………………………………………………….........

…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

……………………………………………………………………………………………………..

……………………………………………………………………………………………………..

……………………………………………………………………………………………………..

[4 marks]
(d) File extension is very important in naming a file. List three file extensions to be presented in the
next computing class.

(i) ……………………………………………………………………………………………..
(ii) ……………………………………………………………………………………………..

(iii) ……………………………………………………………………………………………..
[3 marks]

3. (a) The head teacher of ABC JHS bought the following items for school. 10 footballs for
GH₵ 2,000.00, 20 notebooks for GH₵ 400.00, 50 pens for GH₵ 250.00, 8 registers for
GH₵ 240.00 and 2 laptop computers for GH₵ 7,000.00.

(i) How many columns and rows are needed to create a table for the head teacher’s items
bought including ABC JHS as heading for the table without the serial numbers of the
items?

……………………………………………………………………………………………..

……………………………………………………………………………………………..
[2 marks]

(ii) Outline the steps to be followed to create the table mentioned in 3(a)(i) using Microsoft
Word.

……………………………………………………………………………………………

……………………………………………………………………………………………

……………………………………………………………………………………………

……………………………………………………………………………………………

……………………………………………………………………………………………
[2 marks]
(b) The file size of a presentation created by a student is too large to be sent through e-mail to a friend.
Suggest one possible reason for the large file size.

(i) ……………………………………………………………………………………………

……………………………………………………………………………………………
[2 marks]
(c) State one feature of Microsoft Publisher.

(i) ……………………………………………………………………………………………

……………………………………………………………………………………………
[2 marks]

(d) Study the Microsoft Excel worksheet carefully and use it to answer the question that follows.

A B C D E
1 NAME OF STUDENT TERM 1 TERM 2 TERM 3 TOTAL
2 Kofi Malik 84 75 88 247
3 Ama Ghana 85 74 86 245
Write a function in Microsoft Excel to determine the lowest termly score for Kofi Malik.

………………………………………………………………………………………………….......
[2 marks]

4. (a) Computer networks come in several topologies. State two features of the ring topologies.

(i) ………………………………………………………………………………………….

………………………………………………………………………………………….

(ii) ………………………………………………………………………………………….

………………………………………………………………………………………….
[4 marks]

(b) Abu, the leader of a class does not understand how to use the Forward all feature in an e-mail to
send a message to everyone in the class. Explain to Abu what Forward all means.

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………
[3 marks]

(c) A computing teacher has given a class an assignment to design a personal blog. What two design
features should be used to design the blog?

(i) …………………………………………………………………………………………

…………………………………………………………………………………………

(ii) …………………………………………………………………………………………

…………………………………………………………………………………………
[4 marks]

(iii) Write the name of one tool that can be used to design the blog.

…………………………………………………………………………………………

…………………………………………………………………………………………
[1 mark]
5. (a) In computer operation, expressions are evaluated using operator precedence approach.
Follow the approach and evaluate the expression:
(1+3)*5+7

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………
[3 marks]

(b) How would you describe the term decomposition in programming to a friend who was not in class
when it was taught?

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………
[3 marks]

(c) Mention three software packages that are used in the construction of robotic artifacts.

(i) …………………………………………………………………………………………

…………………………………………………………………………………………

(ii) …………………………………………………………………………………………

…………………………………………………………………………………………

(iii)…………………………………………………………………………………………

…………………………………………………………………………………………
[3 marks]

(d) Write a possible IF-THEN statement for an imaginary expert system to execute the statement:

You are a Monday born and a female which means you are called Adwoa.

………………………………………………………………………………………………….

………………………………………………………………………………………………….

………………………………………………………………………………………………….
………………………………………………………………………………………………….
[3 marks]

END OF ESSAY TEST


PAPER 1
OBJECTIVE

Answer all the questions.

Each question is following by four options lettered A to D. Find the correct option for each question and
shared in pencil on your answer sheet the answer space which bears the same letter as the option you have
chosen. Give only one answer to each question. An example is given below.

Which of the following is an input device?


A. Monitor
B. Projector
C. Speaker
D. Stylus

The correct answer is stylus which is lettered D and therefore answer space D would be shaded.

[A] [B] [C] [D] [E]

Think carefully before you shade the answer spaces. Erase completely any answer you wish to change.

Do all rough work on this question paper. Now answer the following questions.

1. A student in the computer laboratory wants to 4. A blog has many sections. The purpose of the
change the style, size and colour of a typeface in comment section is to
Microsoft Word application. The appropriate A. share personal information with readers.
tool to be used is B. promote other blogs on the same platform.
A. font. C. engage with readers and encourage
B. styles. discussion.
C. clipboard. D. sell products and services to readers and
D. paragraph. friends.

2. A quiz master asked participants to complete the 5. In a printing industry, the device that uses the
statement: whiles the Internet Explorer is used to mechanism of laying down a transparent dye
access information from the internet, Windows and melting dots of wax-based ink to produce
File Explorer is used to an output is a
A. browse the internet using explorer. A. wax heater.
B. edit files in the explorer window. B. wax printer.
C. Manage and organize files and folders. C. thermal heater.
D. Manage and organize music and videos. D. thermal printer.

3. The concept of Artificial Intelligence’s ability to 6. Collaborative robot is a category of robots


suggest related information to a user who that
regularly surfs the internet is referred to as A. works alongside humans.
A. deep learning. B. paints pictures for commercial sake.
B. neural network. C. makes both fast and slow movements.
C. computer vision. D. dances to audience for entertainment.
D. logical reasoning.
7. A student inserted a picture into a Microsoft 12. Good health practice suggests that we take
PowerPoint presentation and needed to work on intermittent breaks while working. The
the picture to adjust the brightness and contrast importance of taking breaks during prolonged
to make it more clearer. The best tool to help the computer use is to
student achieve the task is A. increase productivity in users.
A. Picture Size. B. conserve energy in the computer.
B. Format Picture. C. avoid eye strain and muscle fatigue.
C. Picture Layout. D. increase screen time when working.
D. Picture Effects.
13. Four students in a class wrote the following
function in Microsoft Excel. Which of the
8. A student is watching video from a pen drive functions written by the students will return
using a computer. The process the computer an output?
uses to access the video from the pen drive is A. =SUM(10A:A17)
known as B. =SUM(10A:17A)
A. burning. C. =SUM(A10:A17)
B. caching. D. =SUM(A10:17A)
C. reading.
D. writing. 14. To demonstrate to a class, the steps to be
taken to create a PivotTable from a set of data
in Microsoft Excel worksheet, click on
9. What does the formula = IF(A1>10, A. Home Tab, then PivotTable.
“Pass”,”Fail”) do in a Spreadsheet application? B. Insert Tab, then PivotTable.
A. Checks if the value in cell A1 is equal to 10 C. Data Tab, then PivotTable.
and returns Fail D. View Tab, then PivotTable.
B. Checks if the value in cell A1 is less than 10
and returns Pass 15. In a computer shop, the attendant advised a
C. Checks if the value in cell A1 is greater than customer to buy the fifth generation computer
10 and returns Fail due to its feature that uses
D. Checks if the value in cell A1 is greater than A. transistors.
10 and returns Pass B. vacuum tubes.
C. microprocessors.
10. A teacher tasked students to demonstrate an D. artificial intelligence.
activity using a flowchart diagram. The
appropriate symbol to use at the processing 16. The social media platform that allows
stage of the activity is members to post questions, start a discussion
A. oval. or contribute to various discussions is
B. rhombus. A. Forums.
C. rectangle. B. Facebook.
D. parallelogram. C. Messenger.
D. WhatsApp.

11. Settings and permissions that are specific to a 17. The introduction of Artificial Intelligence as
user and determines the activities the user can come with its related ethical concerns such as
perform on windows environment on the A. job creation.
computer is known as B. bias in algorithm.
A. log. C. improved healthcare.
B. account. D. increased productivity.
C. customization.
D. configuration.
18. A user who selected 4x3 in the insert table grid 24. The robotic club of a school is to construct a
in a Word document will insert robot to be able to detect objects around it.
A. 4 tables. The most appropriate sensor to be used is
B. 12 tables. A. light sensor.
C. a table of 4 rows and 3 columns. B. tactile sensor.
D. a table of 4 columns and 3 rows. C. torque sensor.
D. proximity sensor.
19. The Screenshot feature under the Insert Tab of a
Microsoft PowerPoint application allows a user 25. A teacher tasked her students to create a date
to insert a screenshot of with year, month and day format. The most
A. active application. appropriate Microsoft Excel function to
B. opened applications. achieve the date format is
C. foreground applications. A. DATE().
D. downloaded applications. B. DATEDIF().
C. CURDATE().
20. The examination scores in Computing of a class D. DATEVALUE().
was entered into a Microsoft Excel worksheet.
The appropriate function for finding the largest 26. Cybercriminals can obstruct data in
score in the class is transmission to and from a device or a
A. AVG. network using a data threat attack technique
B. MIN. called
C. MAX. A. fabrication.
D. SUM. B. interruption.
C. interception.
21. In pseudocode, the keyword FOR indicates D. modification.
A. variables or constants in the code.
B. input or output structure in the code. 27. A teacher sends class assignment to his
C. decision control structure in the code. students using an e-mail. The protocol used
D. loop with fixed number of iterations in the by the e-mail to send the assignment over the
code. internet is
A. FTP
22. The central device that communicates with other B. TCP
network devices and manages resources is a C. HTTP
A. hub. D. SMTP
B. client.
C. server. 28. The Merge & Centre button in a Spreadsheet
D. switch. application is used to
A. select multiple cells and center the
23. A user is to apply predefined formatting styles to content.
texts in Microsoft PowerPoint application. The B. create a new worksheet and center the
best features to use is content.
A. WordArt. C. combine and center the content of selected
B. Text Effects. cells.
C. Font Colour. D. combine and center the content of the
D. Quick Styles. worksheet.
29. Arku entered 20 into a computer as quantity of 35. Computer manufacturing went through series
pencils bought. How will the figure be of developmental stages with each stage
represented in the computer for processing? characterized by a unique technological
A. 10010 advancement. The use of integrated circuits is
B. 10011 a characteristics of the
C. 10100 A. first generation.
D. 11001 B. second generation.
C. third generation.
30. Cindy was trying to access information from the D. fourth generation.
WAEC website but whenever she enters the
URL, it takes her to a different website. Her 36. In computer programming, debugging is a
friend advised that she must ensure the URL technique used to
entered is correct because it identifies A. test the code.
A. ads in the web resource. B. fix errors in the code.
B. the texts of the web resource. C. create bugs intentionally.
C. the address of the web resource. D. write code to play games.
D. graphics used in the web resource.
37. Which of the following services best
31. In Desktop Publishing, a user can create a new describes an entrepreneurial opportunity in
document through the following ways except for computer networking?
A. print publication. A. Teaching desktop publishing in schools
B. built-in template. B. Developing game applications for schools
C. blank publication. C. Designing websites for businesses and
D. featured template. schools
D. Setting up Wi-Fi networks for cafes and
32. The Desktop Publishing feature that best helps a schools
user to align objects, texts and elements in a
publication is called 38. The peripheral device shown in Figure 1 is
A. ruler. used to capture
B. layout.
C. guides.
D. margins.

33. One of your classmates continuously sends


threat messages through social media platforms
to you. This act is known as
A. cyberattack.
B. cyberstalking. Figure 1
C. cybersecurity. A. audio data.
D. cyberbullying. B. video data.
C. image data.
34. A computing project work requires students to D. textual data.
design a blog for a school. The best item to be
used for customizing the blog is the school’s
A. flag.
B. logo.
C. crest.
D. uniform.
39. The practice of the use of computers and related 40. Social media users can regulate the type of
electronic resources in an environmentally information they share on their pages. Privacy
responsible manner is termed setting which is one of such activities they
A. ergonomics. can regulate is to
B. green computing. A. make posts visible to everyone.
C. safety precautions. B. prevent one from using the platform.
D. environmental friendliness. C. automatically share posts with everyone.
D. control who can see one’s posts and
information.

END OF PAPER

You might also like