0% found this document useful (0 votes)
4 views

Computing Mock

The document outlines an examination paper consisting of two sections, A and B, with various questions related to computing concepts, software functionalities, and computer networks. Section A requires the analysis of a figure and answering specific questions, while Section B covers a range of topics including email etiquette, data threats, and robotics. Additionally, there is an objective test section with multiple-choice questions on computing terminology and practices.

Uploaded by

Peter Frimpong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computing Mock

The document outlines an examination paper consisting of two sections, A and B, with various questions related to computing concepts, software functionalities, and computer networks. Section A requires the analysis of a figure and answering specific questions, while Section B covers a range of topics including email etiquette, data threats, and robotics. Additionally, there is an objective test section with multiple-choice questions on computing terminology and practices.

Uploaded by

Peter Frimpong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

PAPER 2

ESSAY
[1 hour 15 minutes]
This paper consists of two sections: A and B. Answer Question 1 in Section A and any other
three questions in Section B.
1. Study Figure 1 carefully and use it to answer questions (a) to (k).

a. Write the name of the figure shown above


…..............................................................................................................................

b. Name the parts labelled I, IV, VI, VII, VIII and X


………………………………………………….
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
…………………………………

c. Describe how to add a new slide.


………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………

d. Which of the labelled parts is clicked in order to make changes to the look of
the power point?
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………

e. Describe how to duplicate a slide.


………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………

f. What does the part labelled V do?


………………………………………………………………………………………
………………………………………………………………………………………

g. What is the extension of a file saved using the above figure?


………………………………………………………………………………………
………………………………………………………………………………………

h. Which of the labelled parts is clicked for the slide show?


………………………………………………………………………………………
………………………………………………………………………………………

i. The above figure is a type of …………......................... software.

j. State one function each for the parts labelled VII and X.
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………

2. Use the image shown below to answer questions (a) to (e)


a. Identify the image shown.
………………………………………………………………………………………………
b. Identify the parts labelled I, II, III and IV.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

c. State one feature each for the parts labelled I, II, III and IV.
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….

d. State one advantage and one disadvantage each for the parts labelled I, II, III and IV.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

e. State two hardware for setting up the image shown.


………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

3. a. Define the term computer network.


b. State and describe any two computer network types.
c. State three benefits of using computer networks.
d. State two challenges of using computer networks.

4. a. i) State and explain the four major data threats.


ii) Explain how each of the major data threats stated in (i) can be prevented.

b. Atswei has been given an assignment to research on Ako Adjei, one of the Big Six.
Describe the steps to Atswei on how to research for the information on the internet.
c. State three components of robots.
d. State two uses of robots.

5. a. Define the term Email Etiquette.


b. Yaw Mensah created an email specifically yahoo mail last week. A friend of his
visited him and wanted to log into the account he created, with not more than six lines
how can the friend log into the account?
c. How can a friend of yours prevent his personal computer from being infected. State
any three (3) ways.
d. Mention three (3) copyrighted laws passed in the parliament of Ghana in 2005.
COMPUTING
OBJECTIVE TESTS
Answer all the following questions. Choose from the alternatives lettered A-D
1. A virus designed to attack anti-virus software designed to delete them is called
……….
a. Trojan Horse
b. Retro
c. BIOS Virus
d. Boot Sector Virus
2. One of the importance of using e-mail is that …………
a. Bulk messages can be sent but not received
b. You can access your mail from only your device provided you have internet
connection kept on
c. Messages can be sent at any time of the day as per sender’s convenience
d. It saves a lot of papers but the chance of email getting misplayed is not solved
3. Which of the following computer programs can be used to access and manage user’s
email?
a. Microsoft Outlook
b. Microsoft Access
c. Microsoft Notebook
d. Microsoft Excel
4. Which of the following is an example of page orientation?
a. Landscape
b. A4
c. Superscript
d. Subscript
5. Holding down the Ctrl key and click anywhere in the sentence will ……….
a. Select a paragraph
b. Select a word
c. Select a sentence
d. Select a column of text
6. D5 is a cell address which means ……….
a. the intersection of D columns and 3 rows
b. the intersection of D column and 3 rows
c. the intersection of column D and row 3
d. the intersection of columns D and row 3
7. The process of removing unwanted part of an image is called ……….
a. Bordering
b. Cutting
c. Adjusting
d. Cropping
8. To select a paragraph, which of the following shortcuts can be used?
a. Ctrl + Shift + down arrow
b. Ctrl + Shift + N
c. Ctrl + E keys
d. Ctrl + A keys
9. In Power point presentation, which of the following controls enable a user to view all
the slides in his/her presentation?
a. Presenter View
b. Next button
c. Slide Navigator
d. Slideshow view
10. Among the features of MS Excel, which of them display the content of the active cell?
a. Cell Address
b. Status line
c. Formular Bar
d. Status Bar
11. In MS Excel, which of the Data Entry techniques enables a user to use the fill handle
to extend a series when the first value in a recognized series is entered?
a. Auto Complete
b. Fill Series
c. Auto Fill
d. Pick from Drop down list
12. All the following types of data that can be entered in a cell except?
a. Value
b. Formula
c. Function
d. Integer
13. In writing of computer programs, which of the following building blocks represent
series of instructions which are executed in the exact order in which they were
written?
a. Decision
b. Sequence
c. Iteration
d. Selection
14. In Computer Programming, a statement that describes a variable, function or any
other identifier is called ………….
a. Expression
b. Constants
c. Declaration
d. Hardcore
15. A student wants to change the style, size, and color of a typeface in MS Word
application. The appropriate tool to be used is:
a. Font
b. Clipboard
c. Styles
d. Paragraph
16. In a computer shop, the attendant advised a customer to buy the fifth generation
computer due to its feature that uses ……….
a. transistors
b. vacuum tubes
c. microprocessors
d. artificial intelligence
17. A presenter was creating a Microsoft PowerPoint presentation and he inserted a
picture into it and needed to work on the picture to adjust the brightness and contrast
to make it clearer, what best tool can help the presenter to achieve the task of making
the picture clearer?
a. Picture Layout
b. Picture Size
c. Picture Effects
d. Format Picture
18. Good health practices suggest that we take intermittent breaks while working with our
computer. The benefit a user can get when taking breaks from prolonged usage of the
computer is to ……….
a. increase productivity in users
b. avoid eye strain and muscle fatigue
c. increase screen time when working
d. conserve energy in the computer
19. A user inserted a 2 × 6 table grid in his word document, which kind of the table(s)
will he have in his document?
a. 2 tables with 6 columns each
b. 6 tables with 2 rows each
c. A table with 2 columns and 6 rows
d. A table with 2 rows and 6 columns
20. Gideon wanted to download a movie from a certain movie website but whenever he
enters the URL, it takes him to a different website. His elder sibling, advised him to
check for the correctness of the URL he has entered, because it identifies …………
a. graphics used in the website
b. the address of the website
c. the ads in the website
d. the texts of the website
21. The practice of using computers and their related electronic resources in an
environmentally responsible manner is known as …………
a. Green Computing
b. Environmental Friendliness
c. Ergonomics
d. Safety Precautions
22. In Computer programming, debugging is a technique used for …………
a. writing codes to play games
b. creating bugs intentionally
c. testing the code
d. fixing the errors in the code
23. Joyce was sending a message to Kyei her childhood friend through e-mail but
unfortunately, the message couldn’t reach out to Kyei’s mail inbox. Where can the
message be found among the following folders in Joyce’s mail?
a. Spam

b. Outbox
c. Draft
d. Sent
24. Felix has a computer in his room. This computer is capable of storing a large amount
of data and information which includes software that manages resources on network
and data communication. Felix’s computer can be termed as a …………
a. Server
b. Smart Computer
c. Network Controller
d. Fifth Generation computer
25. Yeboah is a 12 years old boy who has been gifted a red brand-new laptop. Yeboah
cannot live a day without using his laptop and he has even stop seeing his friends in
their homes. What terminology best describes the condition of Yeboah?
a. Computer Consumer
b. Neglecter of Friends
c. Green Computer Consumer
d. Computer Addiction
26. In MS Excel, the insertion pointer which happens to be one of the Excel pointers
enables users to …………
a. add more characters to a document
b. know where to start typing
c. insert a worksheet
d. select a whole row
27. The Merge and Center button in a spreadsheet application, it allows a user to
…………
a. create a new worksheet and center the content
b. select multiple cells and center the content
c. combine and center the content of the worksheet
d. combine and center the content of selected cells
28. Ama started using a laptop a year ago, but yesterday she told one of her friends that
some of her important files are missing from the laptop, and sometimes too when she
is using her computer, the screen turns blue and also the laptop mostly doesn’t boot
properly. What may be the cause of the challenges Ama is facing concerning her
laptop?
a. Overheating
b. Partial Breakdown
c. Virus
d. Fullness of the Hard Disk Drive
29. A field of study and work where people design, build, program, and use robots in
order to ensure the quality of work is called …………
a. Robotics
b. Robotic
c. Robot Intelligence
d. Robot
30. According to Norving and Russell, In the field of Artificial Intelligence four (4)
different approaches are involved and they are: Acting humanly, Thinking humanly,
Thinking rationally and …………
a. Reasoning humanly
b. Acting rationally
c. Acting reasonably
d. Acting Autonomously
31. In a Robotic company, there is a certain component which they fixed in their robot in
order to see the kind of interaction their products are having in its immediate
environment. Which of the components of Robot did they fixed in their products?
a. Actuators
b. Micro-processors
c. Face recognition
d. Sensor
32. In Computer Programming, the classification or category of various types of data
which states the possible values which can be taken is called …………
a. Hardcore
b. Data-types
c. String
d. Iteration
33. The kind of robot which allows humans to perform tasks in hazardous or inaccessible
environments controlled by a human operator from a remote location is termed as
………….
a. Humanoid robot
b. Autonomous robot
c. Augmenting robot
d. Teleoperated robot
34. The entire web which consists of billions of pages covering almost every subject that
a user may look for is called …………
a. Homepage
b. Website
c. URL
d. Web Address
35. Mr. Mensah was sent to a car production company in order to examine and evaluate
the financial affairs of the company using their Information Technology infrastructure
so that he can affirm that there have been some fraudulent acts in the company. What
terminology can be used to describe Mr. Mensah’s duty at the company?
a. Investigation
b. Forensic Auditing
c. Scanning
d. Intellectual Property Right
36. Under information Security, when there is protection of a system’s ability to make
software systems and data fully available whenever a user needs it. This is described
as …………
a. Availability
b. Integrity
c. Confidentiality
d. Retrieval
37. A musician was given 9 months to sell most of his songs. The kind of right given to
the musician to sell most of his songs is termed as …………
a. Trademark
b. Trade Secret
c. Copyrights
d. Patent
38. The use of internet-based social media sites to stay connected with friends, family,
colleagues or customers for a purpose is known as ………… Social Networking
39. A type of network whereby computers are connected over distance and they are
connected by telephone lines is known as ………… WAN
40. Mr. Asamoah mistakenly deleted a file on his laptop and later realize that he needs to
use the deleted file again, what will be his first step in recovering the deleted file?
a. Locate the file
b. Right click on the file icon
c. Go to the Recycle bin
d. Go to the Start Menu

You might also like