Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

BECE MOCK Name…………………………………………………………..

(2024 BECE)
Index Number…………………………………………….....
COMPUTING 1 & 2
1 HR, 45 MINS

COMPUTING 1 HR, 45 MINS


Do not open this booklet until you are told to do so. While you are waiting, read and observe
the following instructions carefully. Write your name and index number in ink in the spaces
provided above.

This booklet consists of two papers; I and II. Answer Paper 2 which comes first in your answer
booklet and Paper 1 on your Objective Test answer sheet. Paper 2 will last for 1 hour after which the
answer book let will be collected. Do not start Paper until you are told to do so. Paper 1 will last 45
minutes.

VERY IMPORTANT INSTRUCTIONS

1. Read through the questions, brainstorm and plan your answers before you finally answer
them. This is one of the good ways to manage your time in an exam and to do well.
2. Write clearly, use simple expressions and provide the best answers possible.
3. Write answers that provide additional information. If you just list answers or provide one
to three worded answers, your will fail the paper.
4. Do well to explain your answers to help earn full marks. Check your units of
measurement, spellings, grammar and read over your work before submitting.
5. Write question numbers boldly, start every new major question (answers) on a new page.
6. Do not rewrite the full question before answering. Only write the question number.
7. Show workings in all instances in section B if the question involves calculations.
COMPUTING
PAPER 2
This paper is in two sections A and B. Answer Question 1 in Section A and any other three questions in
Section B.

SECTION A
[24 MARKS]
Answer Question 1. [Compulsory]

1. Study the devices in figure 1 below carefully and answer the questions that follow.

(a) (i) Write the general name given to the devices in figure 1. (2 marks)
(ii) Name the devices labelled I, II, III, IV and V in figure 1. (10 marks)
(iii) Mention two advantages of the device labelled II. (4 marks)

(b) Identify the names of the following icons as used in desktop publishing. (4 marks)

(c) Re-arrange the following steps used for opening a Microsoft Excel application.
i. Click the Microsoft Excel
ii. Click on All Programs" or " All Apps"
iii. Click on Microsoft Office folder
iv. Click on the Start button. (4 marks)
SECTION B
[36 MARKS]
Answer three questions only from this section

2. (a) What is artificial intelligence? (2 marks)


(b) Give two(2) advantages of using Instagram. (4 marks)
(c) List four(4) examples of data entry devices. (4 marks)
(d) State two(2) uses of USB flash drives. (2 marks)

3. (a) What is search engine? (2 marks)


(b) Write down four(4) layers in the OSI model. (4 marks)
(c) Give two(2) storage devices that use flash memory. (2 marks)
(d) Draw the following flowchart symbols . (4 marks)
i. Start/End ii. Input/Output

iii. Process iv. Decision

4. (a) What is an expression in programming? (2 marks)


(b) State three(3) programming languages. (3 marks)
(c) State three(3) non-physical data threats. (3 marks)
(d) Write two(2) examples each of the following.
i. MS Excel formula. (2 marks)
ii. Functions in MS Excel (2 marks)

5. (a) Classify the following social media sites into the headings in the table.
( YouTube, TikTok, 500px, Vimeo, Snapchat, Pinterest) (6 marks)

Photo sharing social media Video sharing social media

(b) Give two(2) uses of smart watch. (4 marks)


(c) Write the following acronyms in full as used in computer networking.
i. TCP (1 mark)
ii. DNS (1 mark)
PAPER 1
OBJECTIVE TEST
Answer All Questions
Each question is followed by four options lettered A to D. Find out the correct option for each
question and shade in pencil on your answer sheet the answer space which bears the same letter as
the option you have chosen. Give only one answer to each question.

1. Fifth generation of computers use ............


A. microprocessor.
B. artificial intelligence.
C. vacuum tube based
D. integrated circuit based.

2. A cartoon avatar that represents you is called .......


A Emoji.
B. bitmoji.
C. filter.
D. Flickr

3. A special photo overlays which are used to dress up a snap is referred to as .......
A. stickers
B. emojis
C. geo-filters.
D. pinboard.

4. Which of the following is true about quantum computing? Quantum computers....


A. calculateswith cubits.
B. have high error rates.
C. are well-suited for data analysis.
D. calculates in transistors.

5. To upload images on the photo sharing website, firstly .....them so that it is easy to find them while
uploading
A. remove
B. organize
C. create
D. delete

6. Posting a picture or a video in Pinterest is known as.........


A. pinning
B. snapping.
C. tweeting.
D. living.

7. One of the commonly used photo sharing website is .........


A. Facebook lives
B. TikTok
C. Google Photos
D. Pinterest

8. To defraud someone or an organization by creating fake documents or modifying an existing


document is called?
A. forgery.
B. vandalism.
C. plagiarism.
D. piracy.

9. Network fabrication attacks the..........of the system.


A. confidentiality
B. integrity
C. authenticity
D. security

10. Which of the following hackers use their knowledge to hack to check their own security system to make
it more hack-proof?
A. White hat hacker
B. Black hat hacker
C. Grey hat hacker
D. Red hat hacker

11. The type of threat in which an attacker floods the server resources and exhausts the network
bandwidth is known as .......
A. network delivered threat.
B. data extortion.
C. blackhole attack.
D. data security.

12. The term used to describe a group of individuals who scam users is termed as .........
A. plagiarism.
B. phishing.
C. virus.
D. malware

13. Google uses automated programs known as ...which finds pages on the web.
A. crawlers
B. meta search
C. finders
D. searcher

14. Which one of these is used to raise one value to the power of second value and calculates it?
A. Exponentiation
B. Modulus
C. Division
D. Multiplication

15. Logical note takes only.........operand(s).


A. zero
B. one
C. two
D. three

16. The errors that occur in MS Excel when the text in the formula is not recognized is .....
A. #### Error
B. #REF! Error
C. #NUM! Error
D. #NULL! Error

17. In programming, the flowchart symbol for processing symbol is..........


A. rectangular
B. diamond.
C. oval..
D. square
18. Visual impairment refers to the categories of people who are not able to......
A. see
B. hear
C. talk
D. walk.

19. When a computer program runs, a value that does not change is termed as....
A. variable.
B. constant.
C. expression.
D. statement.

20. All the listed below are examples of sites use for sharing video except ......
A. Facebook Live.
B. Vimeo.
C. YouTube.
D. Instagram.

21. Pi=3.14159 is an example of a constant in which programming language?


A. Java
B. C++
C. Python
D. Visual Basic
22. All data entry devices are.......devices.
A. output
B. input
C. storage
D. processing

23. Which type of expression is x + y, 10.75?


A. relational expression.
B. floating expression.
C. Boolean expression.
D. logical expression.

Use this image to answer questions 24 to 26

24. The image is a/an


A. QR code
B. barcode
C. line code
D. number code

25. Which device is used to read the image?


A. Line code reader
B. QR code scanner
C. Barcode reader
D. Numbers code scanner

26. The image is used to ........


A. identify location on maps.
B. access enii account.
C. access the web.
D. identify products in stores.

27. 3+4*5// This expression when being run, which operator is considered first in order of operation
precedence?
A. +
B. *
C.//
D. 3

28. The device used to feed your hand-made drawings into a computer is called.........
A. graphic tablet.
B. magnetic card reader.
C. optical card reader.
D. QR code reader.

29. Constants are used in.......ways.


A. 1
B. 2
C. 3
D. 4

30. Sitting in front of a computer for long hours with no physical activity is a major contributing
factor to ......
A. cancer.
C. obesity
B. diabetes.
D. fever

31. Print "Hello, world" is an example of....


A. variable.
B. constant.
C. expression.
D. statement.

32. How many types of robots do we have in design?


A. 1
B. 2
C. 3
D. 4

33. What is the name or or symbol used to identify manufacturers or distributors of products and services?
A. Patient
B. Copyright
C. Trademark
D. Piracy

34. One of the reasons for using robots in schools is to..........


A. replace teachers.
B. learns for students.
C. teach algorithms.
D. prevent exams failure.

35. If an e-mail message is being sent to multiple recipients, which of the following characters is
used to separate the e-mail addresses of the recipient?
A. Colon
B. Semi-colon
C. Full stop
D. Forward slash

36. The situation whereby machines become smart and are able to solve a task intelligently like
humans is termed as .......
A. machine intelligence.
B. natural intelligence,
C. artificial intelligence.
D. virtual reality.

37. The physical or logical arrangement of network is............


A. topology.
B. routing.
C. networking.
D. intranet.

38. Which of the following technologies is used by smart self-driving cars?


A. Machine learning
B. Neural network
C. Artificial intelligence
D. All the above

39. The use of digital visual elements to enhance the real physical world is known as .......
A. augmented reality.
B. virtual reality.
C. artificial intelligence.
D. artificial neural network

40. The button that opens a dialog box for users to create an email message is ........
A. back.
B. compose.
C. create.
D. refresh.

You might also like