Computing Mock
Computing Mock
ESSAY
[1 hour 15 minutes]
This paper consists of two sections: A and B. Answer Question 1 in Section A and any other
three questions in Section B.
1. Study Figure 1 carefully and use it to answer questions (a) to (k).
d. Which of the labelled parts is clicked in order to make changes to the look of
the power point?
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
j. State one function each for the parts labelled VII and X.
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
c. State one feature each for the parts labelled I, II, III and IV.
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
…..………………………………………………………………………………………….
d. State one advantage and one disadvantage each for the parts labelled I, II, III and IV.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
b. Atswei has been given an assignment to research on Ako Adjei, one of the Big Six.
Describe the steps to Atswei on how to research for the information on the internet.
c. State three components of robots.
d. State two uses of robots.
b. Outbox
c. Draft
d. Sent
24. Felix has a computer in his room. This computer is capable of storing a large amount
of data and information which includes software that manages resources on network
and data communication. Felix’s computer can be termed as a …………
a. Server
b. Smart Computer
c. Network Controller
d. Fifth Generation computer
25. Yeboah is a 12 years old boy who has been gifted a red brand-new laptop. Yeboah
cannot live a day without using his laptop and he has even stop seeing his friends in
their homes. What terminology best describes the condition of Yeboah?
a. Computer Consumer
b. Neglecter of Friends
c. Green Computer Consumer
d. Computer Addiction
26. In MS Excel, the insertion pointer which happens to be one of the Excel pointers
enables users to …………
a. add more characters to a document
b. know where to start typing
c. insert a worksheet
d. select a whole row
27. The Merge and Center button in a spreadsheet application, it allows a user to
…………
a. create a new worksheet and center the content
b. select multiple cells and center the content
c. combine and center the content of the worksheet
d. combine and center the content of selected cells
28. Ama started using a laptop a year ago, but yesterday she told one of her friends that
some of her important files are missing from the laptop, and sometimes too when she
is using her computer, the screen turns blue and also the laptop mostly doesn’t boot
properly. What may be the cause of the challenges Ama is facing concerning her
laptop?
a. Overheating
b. Partial Breakdown
c. Virus
d. Fullness of the Hard Disk Drive
29. A field of study and work where people design, build, program, and use robots in
order to ensure the quality of work is called …………
a. Robotics
b. Robotic
c. Robot Intelligence
d. Robot
30. According to Norving and Russell, In the field of Artificial Intelligence four (4)
different approaches are involved and they are: Acting humanly, Thinking humanly,
Thinking rationally and …………
a. Reasoning humanly
b. Acting rationally
c. Acting reasonably
d. Acting Autonomously
31. In a Robotic company, there is a certain component which they fixed in their robot in
order to see the kind of interaction their products are having in its immediate
environment. Which of the components of Robot did they fixed in their products?
a. Actuators
b. Micro-processors
c. Face recognition
d. Sensor
32. In Computer Programming, the classification or category of various types of data
which states the possible values which can be taken is called …………
a. Hardcore
b. Data-types
c. String
d. Iteration
33. The kind of robot which allows humans to perform tasks in hazardous or inaccessible
environments controlled by a human operator from a remote location is termed as
………….
a. Humanoid robot
b. Autonomous robot
c. Augmenting robot
d. Teleoperated robot
34. The entire web which consists of billions of pages covering almost every subject that
a user may look for is called …………
a. Homepage
b. Website
c. URL
d. Web Address
35. Mr. Mensah was sent to a car production company in order to examine and evaluate
the financial affairs of the company using their Information Technology infrastructure
so that he can affirm that there have been some fraudulent acts in the company. What
terminology can be used to describe Mr. Mensah’s duty at the company?
a. Investigation
b. Forensic Auditing
c. Scanning
d. Intellectual Property Right
36. Under information Security, when there is protection of a system’s ability to make
software systems and data fully available whenever a user needs it. This is described
as …………
a. Availability
b. Integrity
c. Confidentiality
d. Retrieval
37. A musician was given 9 months to sell most of his songs. The kind of right given to
the musician to sell most of his songs is termed as …………
a. Trademark
b. Trade Secret
c. Copyrights
d. Patent
38. The use of internet-based social media sites to stay connected with friends, family,
colleagues or customers for a purpose is known as ………… Social Networking
39. A type of network whereby computers are connected over distance and they are
connected by telephone lines is known as ………… WAN
40. Mr. Asamoah mistakenly deleted a file on his laptop and later realize that he needs to
use the deleted file again, what will be his first step in recovering the deleted file?
a. Locate the file
b. Right click on the file icon
c. Go to the Recycle bin
d. Go to the Start Menu