Share
BECE INFORMATION AND COMMUNICATIONS TECHNOLOGY 2012

SponsoredAdvertise

Save/Print Questions

OBJECTIVE TEST

1.

The device that converts computer output into displayed images is the ......................

A.
hard disk
B.
monitor
C.
printer
D.
processor

2.

The least number of input devices that a computer system can have is .....

A.
1
B.
2
C.
3
D.
4

3.

Which of the following devices has the largest storage capacity?

A.
compact disk
B.
digital versatile
C.
floppy disk
D.
hard disk

4.

The device used to ensure a constant flow of power supply to a computer system is the...

A.
stabilizer
B.
step-down transformer
C.
step-up transformer
D.
UPS

5.

The total number of command buttons on the title bar of an opened word processing window is ....

A.
2
B.
3
C.
5
D.
6

6.

Processed or transformed facts which are meaningful to the user is called ....

A.
data
B.
information
C.
input
D.
output

7.

The following are possible health hazards of prolonged use of the computer system except

A.
back and neck pains
B.
eye strain
C.
tuberculosis
D.
wrist pains

8.

Which key on the keyboard is used to erase characters from the right to the left in word processing application?

A.
backspace
B.
delete
C.
insert
D.
pause

9.

The key on the QWERTY keyboard used to produce alphabetic upper case letters is ...

A.
caps lock
B.
home
C.
num lock
D.
tab

10.

Given sizes and designs of letters, numbers and symbols that are displayed in a word processing document are referred to as ...

A.
align
B.
bullet
C.
font
D.
indent

11.

Which of the following is a tool on the drawing toolbar of a word processing program?

A.
align
B.
bold
C.
view
D.
oval

12.

When an image is copied, it first goes to the

A.
clip art
B.
clipboard
C.
my document
D.
recycle bin

13.

To press letter J, which finger is appropriate to use on a QWERTY keyboard?

A.
left index finger
B.
left middle finger
C.
right index finger
D.
right middle finger

14.

The internet is a

A.
global network of computer
B.
government agency that links computers
C.
software for designing programs
D.
special network of computers in an office

15.

The computer equivalence of a sheet of paper divided into rows and columns in the office suits is called ....

A.
database
B.
electronic sheet
C.
spreadsheet
D.
word processor

16.

The temporary working memory of a computer system is the .........

A.
arithmetic logic unit
B.
flash memory
C.
random access memory
D.
read only memory

17.

The software responsible for the management of the basic operations of the computer is the

A.
application program
B.
device driver
C.
operating system
D.
utility program

18.

On the desktop, the part which displays opened applications and other icons is referred to as......

A.
scroll bar
B.
taskbar
C.
title bar
D.
toolbar

19.

The act of pressing a computer mouse button twice quickly without moving the mouse is termed ...

A.
double clicking
B.
right clicking
C.
single clicking
D.
normal clicking

20.

The following are good practices in the computer environment except.........

A.
copyrighting of software
B.
designing of cards
C.
networking of computer
D.
pirating of software

21.

Which of the following software can be used to enhance teaching and learning through the use of pictures, video and sound? <\p>

A.
multimedia software
B.
network software
C.
programming software
D.
utility software

22.

The total number of keys on a standard QWERTY keyboard is

A.
96
B.
104
C.
108
D.
116

23.

Which of the following is a valid folder name?

A.
Black/stars
B.
Black stars
C.
Black:stars
D.
Black*

24.

A program on the computer which enables users to type letters to friends is the .......

A.
browser
B.
spreadsheet
C.
utility
D.
word processing

25.

The command that enables user to save a previously saved document under a new name is ........

A.
new
B.
rename
C.
save
D.
save as

26.

The standard toolbar contains buttons that

A.
close and resize windows
B.
control page margins and tabs
C.
performs the most tasks
D.
help users to navigate through the document

27.

To see exactly how pages of a current document will appear when printed, the command given is the ........

A.
page setup command
B.
print command
C.
print preview command
D.
view command

28.

A tool for locating information on the internet is the.....

A.
database engine
B.
internet engine
C.
search engine
D.
web browser

29.

An entity in a file system which contains a group of files is called ..........

A.
cabinet
B.
container
C.
document
D.
folder

30.

The creation of a copy of data on a computer system for safe keeping externally is referred to as......

A.
data backup
B.
data entry
C.
data filtering
D.
data restoration

31.

The letter that normally represents the floppy disk in an operating system is

A.
A
B.
C
C.
D
D.
E

32.

Recycle bin or trash bin contains deleted files and folders from the.........

A.
floppy disc
B.
flash disk
C.
hard disk
D.
zip

33.

Keys on a computer keyboard which are used to move the cursor in a specified direction are called ......

A.
arrow keys
B.
function keys
C.
shift keys
D.
special purpose keys

34.

To underline a selected text in a word processing program, the keys used are

A.
Ctrl + U
B.
Shift + U
C.
Alt + U
D.
Del + U

35.

Double clicking on a word in a word processing program selects the ...........

A.
document
B.
paragraph
C.
sentence
D.
word

36.

All the following are reasons for using ICT in education except...............

A.
forcing students to learn at other's pace
B.
increasing learner motivation and engagement
C.
facilitating the acquisition of basic skills in subject areas
D.
enhancing teaching through the use of presentation software

37.

In word processing program, lines block arrows and flow charts are found on which of the following toolbars?

A.
drawing
B.
formatting
C.
picture
D.
standard

38.

Which program icon on the desktop leads to the disk drives?

A.
internet explorer
B.
my computer
C.
my document
D.
my network places

39.

Which of the following terms refers to unsolicited e-mails in the form of advertising or chain letters?

A.
compose
B.
inbox
C.
spam
D.
trash

40.

Computer virus is capable of ........................

A.
enhancing the content of a file
B.
maintaining the computer system
C.
making the work of the computer easy
D.
slowing down the computer system performance

THEORY QUESTIONS

1.

Use the diagram below to answer questions (a) and (b).

(a)

Identify the diagram.

(b)

Name the parts labelled A, B, C, D, E and F of the diagram.

(c)

List the five main components of a computer keyboard.

(d)

Give the stages involved in the information processing cycle.

(e)

List, in the right order, the steps involved in turning off a personal computer

Show Solution
2.

(a)

State the function of each of the following devices.

(i)

Floppy disk;

(ii)

Printer;

(iii)

Scanner;

(iv)

Uninterruptible power supply.

(b)

Write the following in full:

(i)

ALU

(ii)

CPU

Show Solution
3.

(a)

Explain the following types of software

(i)

System software;

(ii)

Application software.

(b)

State the function of each of the following buttons as used in application software.

(i)

Minimize

(ii)

Maximize

(iii)

Close

Show Solution
4.

(a)

Explain internet fraud.

(b)

State three ways ICT can be used in basic education in Ghana.

(c)

List three devices that may be used when connecting to the internet.

Show Solution
5.

Explain the following terms as used in spreadsheet:

(a)

Worksheet

(b)

Active cell

(c)

Range

(d)

Workbook

Show Solution

SponsoredAdvertise