Skip to content
BECEzone

THE WEST AFRICAN EXAMINATIONS COUNCIL GHANA

Basic Education Certificate Examination

Computing 2024

OBJECTIVE TEST

Objective Test

Question 1

A student in the computer laboratory wants to change the style, size and colour of a typeface in Microsoft Word application. The appropriate tool to be used is

Question 2

A quiz master asked participants to complete the statement: whiles the Internet Explorer is used to access information from the internet, Windows File Explorer is used to

Question 3

The concept of Artificial Intelligence's ability to suggest related information to a user who regularly surfs the internet is referred to as

Question 4

A blog has many sections. The purpose of the comment section is to

Question 5

In a printing industry, the device that uses the mechanism of laying down a transparent dye and melting dots of wax-based ink to produce an output is a

Question 6

Collaborative robot is a category of robots that

Question 7

A student inserted a picture into a Microsoft PowerPoint presentation and needed to work on the picture to adjust the brightness and contrast to make it more clearer. The best tool to help the student achieve the task is

Question 8

A student is watching video from a pen drive using a computer. The process the computer uses to access the video from the pen drive is known as

Question 9

What does the formula = IF(A1>10,\"Pass\",\"Fail\") do in a Spreadsheet application?

Question 10

A teacher tasked students to demonstrate an activity using a flowchart diagram. The appropriate symbol to use at the processing stage of the activity is

Question 11

Settings and permissions that are specific to a user and determines the activities the user can perform on windows environment on the computer is known as

Question 12

Good health practice suggests that we take intermittent breaks while working. The importance of taking breaks during prolonged computer use is to

Question 13

Four students in a class wrote the following function in Microsoft Excel. Which of the functions written by the students will return an output?

Question 14

To demonstrate to a class, the steps to be taken to create a PivotTable from a set of data in Microsoft Excel worksheet, click on

Question 15

In a computer shop, the attendant advised a customer to buy the fifth generation computer due to its feature that uses

Question 16

The social media platform that allows members to post questions, start a discussion or contribute to various discussions is

Question 17

The introduction of Artificial Intelligence as come with its related ethical concerns such as

Question 18

A user who selected 4 x 3 in the insert table grid in a Word document will insert

Question 19

The Screenshot feature under the Insert Tab of a Microsoft PowerPoint application allows a user to insert a screenshot of

Question 20

The examination scores in Computing of a class was entered into a Microsoft Excel worksheet. The appropriate function for finding the largest score in the class is

Question 21

In pseudocode, the keyword FOR indicates

Question 22

The central device that communicates with other network devices and manages resources is a

Question 23

A user is to apply predefined formatting styles to texts in Microsoft PowerPoint application. The best features to use is

Question 24

The robotic club of a school is to construct a robot to be able to detect objects around it. The most appropriate sensor to be used is

Question 25

A teacher tasked her students to create a date with year, month and day format. The most appropriate Microsoft Excel function to achieve the date format is

Question 26

Cybercriminals can obstruct data in transmission to and from a device or a network using a data threat attack technique called

Question 27

A teacher sends class assignment to his students using an e-mail. The protocol used by the e-mail to send the assignment over the internet is

Question 28

The Merge & Centre button in a Spreadsheet application is used to

Question 29

Arku entered 20 into a computer as quantity of pencils bought. How will the figure be represented in the computer for processing?

Question 30

Cindy was trying to access information from the WAEC website but whenever she enters the URL, it takes her to a different website. Her friend advised that she must ensure the URL entered is correct because it identifies

Question 31

In Desktop Publishing, a user can create a new document through the following ways except for

Question 32

The Desktop Publishing feature that best helps a user to align objects, texts and elements in a publication is called

Question 33

One of your classmates continuously sends threat messages through social media platforms to you. This act is known as

Question 34

A computing project work requires students to design a blog for a school. The best item to be used for customizing the blog is the school's

Question 35

Computer manufacturing went through series of developmental stages with each stage characterized by a unique technological advancement. The use of integrated circuits is a characteristic of the

Question 36

In computer programming, debugging is a technique used to

Question 37

Which of the following services best describes an entrepreneurial opportunity in computer networking?

Question 38

Question 38 diagram
The peripheral device shown in Figure 1 is used to capture

Question 39

The practice of the use of computers and related electronic resources in an environmentally responsible manner is termed

Question 40

Social media users can regulate the type of information they share on their pages. Privacy setting which is one of such activities they can regulate is to

THEORY

ESSAY

Answer all of Question 1

Question 1

Theory question 1 diagram

Figure 1 shows computer users in a school's computer laboratory. Study the figure carefully and use it to answer questions 1(a) to 1(g). (a) Which of the users has assumed the correct posture? (b) Prolonged use of the computer is associated with health-related problems. Suggest two possible safety measures the users should adopt to minimize workstation risks. (c) The users were tasked to produce a ten-page document using Microsoft Word. Outline the steps to be taken by the users to set the entire ten-page document to 2.0 line spacing. (d) The users were to type a report using Microsoft Word to be presented in class. User I typed 10 pages within 3 hours, user II typed 8 pages within 4 hours, user III typed 5 pages within 6 hours, and user IV typed 6 pages within 2 hours. Suggest two Microsoft Excel chart types that will be most appropriate to show the relationship between the number of pages each user typed and the time spent in typing. (e) The users have been using their computers as standalone. State two benefits they will derive when their computers are networked. (f) As a networking consultant, suggest two network topologies that could be used to network the computers for the users. (g) The following activities were given to each user to type using Microsoft Word. They were to use Microsoft Publisher to produce a flyer with the typed document to be displayed on the notice board of each classroom. School routine activities: 7:30 a.m. : Morning assembly 7:40 a.m. : Classes hours 9:40 a.m. : Morning break 10:00 a.m. : Classes hours 12:30 p.m. : Afternoon break 1:00 p.m. : Classes hours 2:30 p.m. : Closing As a programming student, write an algorithm to demonstrate the activity.

Question 2

Theory question 2 diagram

(a) Describe the processor of a computer to colleagues in your class. Study Figure 2 carefully and use it to answer questions (b) and (c). (b) Write the name of the image shown in Figure 2. (c) Describe to your colleagues how the image shown in Figure 2 is accessed for information. (d) File extension is very important in naming a file. List three file extensions to be presented in the next computing class.

Question 3

Theory question 3 diagram

(a) The head teacher of ABC JHS bought the following items for school: 10 footballs for GH₵ 2,000.00, 20 notebooks for GH₵ 400.00, 50 pens for GH₵ 250.00, 8 registers for GH₵ 240.00, and 2 laptop computers for GH₵ 7,000.00. (i) How many columns and rows are needed to create a table for the head teacher’s items bought, including ABC JHS as the heading for the table, without the serial numbers of the items? (ii) Outline the steps to be followed to create the table mentioned in 3(a)(i) using Microsoft Word. (b) The file size of a presentation created by a student is too large to be sent through e-mail to a friend. Suggest one possible reason for the large file size. (c) State one feature of Microsoft Publisher. (d) Study the Microsoft Excel worksheet carefully and use it to answer the question that follows. Write a function in Microsoft Excel to determine the lowest termly score for Kofi Malik

Question 4

(a) Computer networks come in several topologies. State two features of the ring topology. (b) Abu, the leader of a class, does not understand how to use the Forward All feature in an e-mail to send a message to everyone in the class. Explain to Abu what Forward All means. (c) A computing teacher has given a class an assignment to design a personal blog. (i) What two design features should be used to design the blog? (ii) Write the name of one tool that can be used to design the blog.

Question 5

(a) In computer operation, expressions are evaluated using the operator precedence approach. Follow the approach and evaluate the expression: (1 + 3) * 5 + 7 (b) How would you describe the term decomposition in programming to a friend who was not in class when it was taught? (c) Mention three software packages that are used in the construction of robotic artifacts. (d) Write a possible IF-THEN statement for an imaginary expert system to execute the statement: You are a Monday born and a female, which means you are called Adwoa.

Answer three Questions only from this section

Questions for this section are in the printed paper.