Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
111 views14 pages

Computing

Uploaded by

wcgj7x9q2x
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views14 pages

Computing

Uploaded by

wcgj7x9q2x
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

07104/2&1 BECE

June 2024 Name


COMPUTING 2& 1
Essay and Objective
2 hours 2&1 Index Number

Signature

Date of Examination

THE WEST AFRICAN EXAMINATIONS COUNCIL


GHANA

Basic Education Certificate Examination


June 2024 COMPUTING 2 & 1 2 hours

Do not open this booklet until you are told to do so. While you are waiting, read and observe the
following instructions carefully:. Write yor name, index number. signature and date of examination
in ink in the spaces provided above.

This bookler consists of two papers. Answer Paper 2 which comes first, in the booklet and Paper 1
on yor Objective Test answer sheet. Paper 2 willlast 1hour 15 minutes. Do not start Paper 1 until
youare told to do so. Paper 1 will last 45 minutes. At the end of the examination, submit the entire
question paper to the invigilator.

Any candidate who tears off any part of the question paper will be severely penalized.

Whether you answer all the questions in this paper or not, hand in the entire question paper to the
invigilator.

For Examiner's Use Only

Question Number Mark

TOTAL
o 2024 The West African Examinations Council
jom/cg/07 104/2& 1/24/spd/bec
PAPER 2 1% hour
IsSAY
|60 marks]

questio1s insJKper
Sectionis inB. two scctions: Amd B Answer (Qmestion 1in Scction Aand any other three
TeT all ihe qestions in the spoces provided in this question paper. At the end of the
CXamnalion, v0 shoull subii the entire auestion paper to the InVigldl0:
h camdidate who tears off any part of the questionpaper will be severely penalized.
WhCIheT 0u answer all the auestiots in this paper or not, hand in the entire question paper
to the innigilator.

Tedit will be given for clarity of expression and orderly presentation of material.
SECTION À
[24 marks]
Answer Question 1.
[Compulsory]
1. Figure 1 shows computer users in a school's computer
laboratory.
Study the figure carefully and use it to answer questions 1(a) to 1(g).

II

II IV

Figure 1

(a) Which of the users has assumed the correct sitting


posture?

[2 marks]
(b) Prolonged use of the computer is associated with
possible safety measures the users should adapt to health-related
minimize
problems. Suggest two
workstation risks.
()

jom/cg/07104/2&1/24/spd/bec
()

[4 marks]

Microsoft Word. Outline the steps


(c) The users were fasked to produce aten papedocument using
line spacing.
to be takcn by the uscrs to set thc cntire ten-page document to 2.0

(4 marks]

presented in class. User Ityped


(d) The users were to type a report using Microsoft Word to be within 6
typed 5 pages
10 pages within 3 hours, user Iltyped 8 pages within 4 hours, user III
hours and user IV typed 6 pages within 2 hours.
Suggest two Microsoft Excel chart types that will be most appropriate to show the
relationship between the number of pages each user typed and the time spent in typing.

()

(i)
[2 marks]
The users have been using their computers as standalone. State two benefits they will
(e)
derive when their computers are networked.

()

(ii)
[4 marks]

As anetworking consultant, suggest two network topologies that could be used to network
the computers for the users.
(0)

(i)
(2 marks]

(g) The following activities were given to each user to type using Microsoft Word. They were
to use Microsoft Publisher to produce a flyer with the typed document to be displayed
on the notice board of each classroom.

jom/cg/01 104/2&1/24/spd/bec
Turn over
School routine activities
7:30 a.m.: Morning assembly
7:40 a.m.: Classes hours
9:40 a.m.: Morning brcak
10:00 a.m.: Classes hours
12:30 p.m.:Afternoon break
1:00p.m.: Classes hours
2:30 p.m.: Closing

As a programming student, wvrite an algorithm to demonstrate the activity.

[6marksl
jom/cg/07104/2&1/24/spd/bec
SsCION B
| 36 marks |
Answer three questions only from this section.

2. (a) Deseribe the processor of a comnputer to colleagues in your class.

[3 marks)
Study Figure 2 carefully and use it to answer questions 2(b) and 2(c)

Figure 2

(6) Write the name of the image shown in Figure 2.

[2 marks]

(c) Describe to your colleagues, how the image shown in Figure 2 is accessed for information.

[4 marks)
(d) File extension is very important in naming a file. List three file extensions to be
presented in the next computing class.

(i)

(iü)
[3 marks]
jom/cg/07104/2& 1/24/spd/bec Turn over
10 footbalis
3 (a) The head teacher ofABC JHS bought the following items for the school.
for Gh¢ 2.000.00, 20 notebooks for Ghc 400.00. 50 pens for Gh¢ 250.00, 8 registers
for Ghé 240.00 and 2laptop computers for (Gh¢ 7,000.00.
teacher's
How nany coluns and rous are necded to crcate a table for the head
items bought inchuding ABC JIS as hcading for the table without the serial
numbers of the items?

[2 marks]
(ii) Outline the steps to be followed to create the table mentioned in 2(a)(i)
using Microsoft Word.

[4 marks]
(b) The file size of a presentation created by a student is too large to be sent through
e-mail to a friend. Suggest one possible reason for the large file size.

[2 marks]

(c) State one feature of Microsoft Publisher.


()

[2 marks]
(d) Study the Microsoft Excel worksheet carefully and use it to answer the question
that follows.

A B D E
NAME OF STUDENT TERM I TERM 2 TERM 3 TOTAL
|2 Kofi Malik 84 75 88 247
3Ama Ghana 85 74 86 245

Write a function in Microsoft Excel to determine the lowest termly seore for Kofi Malik

[2marks]

jom/cg/07104/2&1/24/spd/bec
7
4 (a) Computer networks come in several topologies. State two fcatures of the ring topologies.

(i)

[4 marks]

(6) Abu. the leader of a class does not understand how to use the Forward all feature
in an c-mail to send a message to everyone in the class. Explain to Abu what Forward
all means.

[3 marks]

(c) A
Computing teacher has given aclass an assignment to design a personal blog.
What two design features should be used to design the blog?
(1)

(i)

[4 marks]
(iiü) Write the name of one tool that can be used to design the blog.

[lmark]

jom/cg/07104/2&1/24/spd/bec
Turn over
5. (a) In computer operation, expressions are cvaluatcd using operator precedence approach.
Follow the approach andevaluate the Cxpression:
(13) *5+7

[3 marks)
(6) How would youdescribe the term
decomposition in
who was not in class when it was taught? programming to a friend

B marks)
(c) Mention three software packages that are used in the construction of
robotic artefacts.

(i)

3 marks]
(d) Write a possible IF-THEN statement for an imaginary expert system to execute the
statement:

You are a Monday born and a female which means you are called Adwoa.

|3 marks]
jom/cg/07104/2&1/24/spd/bec
END OF ESSAY TEST
DO NOT TURN OVER THIS PAGE
UNTIL YOUARE TOLD TO DO S0.

YOU WILLBE PENALIZED SEVERELY IF YOUARE


FOUND LOOKINGAT THE NEXT PAGE BEFORE
YOUARE TOLD TO DO S0.
PAPER I 45 minutes
OBIECTIVE TEST

Answer all the questions on your Objective Test answer sheet.


1 Use 2B pencil throughout.
2 On the pre-printed answer sheet, check that the following details are correctly printed:
Your surname followed by your other names,the Subject Name, your Index Number,
Cenire Number and the Paper Code.

3 In the boxes marked Candidale Number, Centre Number and Paper Code, reshade each of the
shaded spaces.
4 An example is given below. This is for a candidate whose name is Erica Afiba MANU.
Her index number is 772384188 and she is writing the examination at Centre Number 17234.
She is offering Computing 1and the Paper Code is 0711.

THE WEST AFRICAN EXAMINATIONS COUNCIL, GHANA


BASIC EDUCATION CERTIFICATE EXAMINATION
OBJECTIVE ANSWER SHEET
CANDIDATE NAME: SUBJEC:

MANUERICA AFIBA COMPUTING 1


|1. Use 2B pencil, Press firmly.
|2. Answer each question by choosing one 4. If only four alternative answers are given
chosen like this CA cCa cD cE 5. Your question paper may have fewer
3. If you want to change an answer, erase than 60 questions.
your first mark completely.

CANDIDATE NUMBER CENTRENUMBERPAPER COD


7723 84 18l8 ZZ234 For
EO02 0 0 0 0200OP Supervisors
only.
2 2 2 2 - 2 2 2 2 222 2 222222 2a 2a2a 2a
Candidate
3 333 3 5 3 a 33E3 33-313 33333
0s absent
4 c4a 4a c4a
E4 E434 4-4a 4 43 45 c434a c43 shade
55a 5 5a 5
this space.
66 66 666 66 66666 E6666
737372 7

om/g/07104/2& 1/24/spd/bec
Answer all the questions.

bach auestion is followed bhy lour opiions


.nd hde in pencil o1 yoW NSVeT lelered A to D. Find the correct option for each
iy 9u hve chosen. GVe 0nly one Sheet the unswer space which bears the
nsver to each question. An example is same letter as
given below.
Whichofthe following is an inputdevice?
A. Monitor
B. Projcctor
C. Speaker
). Stylus

The correct answer is stylus


icd.
which is lettered D and therefore answer space
CBJ D would be
Think carefully before you shade the
answer spaces. Erase completely any ans wer you wish to
Do all rough work on this
question paper: Now answer the following questions.
The robotic club of a school is to 5
robot to be able to detect objects construct
a A student is
watching video from a pen drive
The most appropriate sensor to be
around it. using acomputer. The process the computer
A.
used is uses to access the video from the pen drive
B
proximity sensor. is known as
tactile sensor. A
C torque sensor. B.
burning.
D. light sensor.
writing.
C.
reading.
D.
Arkuentered 20 into a computer as caching.
of pencils bought. How willthe figurequantity
be 6 A teacher tasked students to demonstrate an
represented in the computer for processing? activity using aflowchart diagram. The
A. 10011
appropriate symbol to be used at the
B. 10010 processing stage of the activity is
C 10100 A. parallelogram.
D. 11001 B. oval.
C.
rectangle.
The Screenshot feature under the Insert Tab D rhombus.
of a Microsoft PowerPoint application allows
a user to insert a screenshot of 7. Ateacher sends class assignment to his
A foreground applications. students using an e-mail. The protocol used
B. opened applications. by the e-mail to send the assignment over the
C. active applications. Internet is
D. A SMTP.
downloaded applications. B HTTP.
A user is to apply predefined formatting C. TCP.
styles to texts in Microsoft PowerPoint D. FTP.
application. The best feature to use is
A. Quick Styles.
B WordArt.
C. Font Colour.
D. Text Effects.

m/o/07104/2& 1/24/spd/bec
8. The peripheral device shown in Figure I is 13 Collaborative robot is a category of
used to capture that
pants pictures for commerc
dances to audicnce for
Cntertanment.
( makes both fast and slow
movemcnts.
D. works alongside hunans.

14. The examination scores in Computin:


Figure I
A Image data. class was entered into aMicrosoft
B. video data. worksheet. Theappropriate function
audio data. finding the largest score in the class
D textual data.
A. SUM.
B. MIN.
C. MAX.
Thesocial media platforn that allows
D. AVG.
members to post questions, start a discussion
or contribute to various discussions is
A Facebook.
15. Aquiz master asked participants to
B Forums. complete the statement: whiles the Ini
C Explorer is used to access informatior
WhatsApp. the internet, Windows File Explorer is
D. Messenger. A. manage and organize files an.
folders.
10. Cindy was trying to access information from
the WAECwebsite but whenever she enters
B. edit files in the explorer wind
C. manage and organize music a
the URL, it takes her to a different website. videos.
Her friend advised that she must ensure the
D. browse the internet using exp
URL entered is correct because it identifies
A. ads in the web resource.
16. Good health practice suggests that we
B the address of the web resource.
intermittent breaks while working. Th
C the texts of the web resource.
D. graphics used in the web resource.
importance of taking breaks during pro
Computer use is to
A. Increase screen time when wor
11. The Mer!e & Center button in a B avoid eye strain and muscle ta
Spreadsheet application is used to C. conserve energy in the compu
A. create a new worksheet and center
D. increase productivity in users.
the content.
B. select multiple cells and center the 17. A teacher tasked her students to creat
content. date with year, month and day format.
C. combine and center the content of
most appropriate Microsoft Excel fun
selected cells. to achieve the date format is
D. combine and center the content of
A DATEVALUE).
the worksheet. B DATE).
C. DATEDIF().
12. The Desktop Publishing feature that best D CURDATE).
helps a user to align objects, texts and
elements in a publication is called
A ruler.
B. guides.
C. layout.
D margins.
jom/cg/07104/2&1/24/spd/bec
Turn o
12
programming, debugging js a
23. In computer
18. Settings and permissions that are specific to technique used to
code.
a uscr and determines thc activitics the user
A. fix errors inthe
can perform on windows cnvironment on thc B write code toplay games.
computer is known as crcate bugs intentionally.
C
A. account. D.
test the code.
B. customization.
sends
C. configuration. 24. One of your classmates continuously
media
D. log. thrcat mcssages through social
platforms to you. This act is known as
19. The practicc of the use of computers and A. cyberbullying.
related electronic resources in an B cyberstalking.
environmentally responsiblemanner is C. cybersecurity.
termed D cyberattack.
A. green computing.
B. ergonomics. 25. To demonstrate to a class, the steps to be
C. environnental friendliness. taken to create a PivotTable from a set of
D. safety precautions. data in Microsoft Excel worksheet, click on
A. Home Tab, then PivotTable,
20. Social media users can regulate the type of B Insert Tab, then PivotTable.
information they share on their pages. C. View Tab, then PivotTable.
Privacy setting which is one of such activities D. Data Tab, then PivotTable.
they can regulate is used to
A. automatically share posts with 26. A student in the computer laboratory wants
everyone. to change the style, size and colour of a
B prevent one from using the platform. typeface in Microsoft Word application.
control who can see one's posts and The appropriate tool to be used is
information. A. styles.
D make posts visible to everyone. B paragraph.
C. font.
21. A computing project work requires students D. clipboard.
to design a blog for a school. The best item
to be used for customizing the blog is the 27. A student inserted a picture into a Microsoft
school's PowerPoint presentation and needed to work
A. crest.
on the picture to adjust the brightness and
B logo. contrast to make it more clearer. The best
C flag. toolto help the student achieve the task is
D uniform. A. Format Picture.
B Picture Layout.
22. Which of the following services best C Picture Size.
describes an entrepreneurial opportunity in D. Picture Effects.
computer networking?
A. Designing websites for businesses 28. What does the formula =IF(A|>10, "Pass",
and schools
"Fail")do in a Spreadsheet application?
B Developing game applications for A. Checks if the value in cell Al is less
schools
than 10 and returns Pass
C. Teaching desktop publishing in B Checks if the value in cell Al is
schools
equalto 10 and returns Fail
D Setting up Wi-Fi networks for cafes C.
and schools Checks if the value in cellAl is
greater than 10and returns Fail
D. Checks if the value in cell Al is
greater than 10 and returns Pass
jom/cg/07104/2& 1/24/spd/bec
13

29. In pseudocode, the keyword FOR


A. loop with fixcd number of indicates 35. Computer manufacturing went through
in the code. iterations series of developmcnta! stages with each
B input or output structure in the codc stage characterized by a unique
C. decision control structure in the technological advancement. The use of
code. integrated circuits is a characteristic of the
D. variablcs or constants in the code. second generation.
B. first generation.
In aprinting industry. the device that uses the C. fourth generation.
30.
D. third generation.
mechanism of laying down a transparent dye
andmelting dots ofwax-based ink to 36 The introduction ofArtificial Intelligence has
produce an output is a come with its related ethical concerns such
A. wax heater.
as
B. thermal heater.
A. job creation.
C. Iwax printer. B. improved healthcare.
D. thermal printer. C. increased productivity.
D. bias in algorithm.
31. A user who selected 4x3 in the insert table
grid in a Word document will insert 37.
A. 4 tables.
In acomputer shop, the attendant advised a
customer to buy the fifth generation
B a table of 4 rows and 3 columns. computer due to its feature that uses
12 tables. A. vacuum tubes.
D. atable of 4 columns and 3 rows. B. microprocessors.
C. artificial intelligence.
32. Cybercriminals can obstruct data in D. transistors.
transmission to and from a device or a
network using a data threat attack technique 38. The central device that communicates with
called other network devices and manages
A interruption. resources is a
B. fabrication. A. server.

interception. B. client.
D modification. C. hub.
D. switch.
33. Four students in a class wrote the following
function in Microsoft Excel. Which of the 39. . A blog has many sections. The purpose of
functions written by the students will return the comment section is to
an output? A. share personal information with
A -SUM(10A:A17) readers.
B =SUM(A10:A17) B. sell products and services to readers
C. =SUM(10A:17A) and friends.
D =SUM(A10:17A) C. engage vith readers and encourage
discussion.
34. In Desktop Publishing, a user can create a D. promote other blogs on the same
new document through the following ways platform.
except for
A print publication.
B. built-in template.
C. featured template.
D. blank publication.

jom/cg/07104/2& 1/24/spd/bec
14

40. The concept ofArtificial Intelligence's ability


to suggest related information to auser who
regularly surfs the internet is referred to as
A. neural network.
B logical reasoning.
Computer vision.
D deep learning.

END OF PAPER

You might also like