Share
BECE INFORMATION AND COMMUNICATIONS TECHNOLOGY 2020

SponsoredAdvertise

Save/Print Questions

OBJECTIVE TEST

1.

A computer model that looks like a brief case is called

A.

tower.

B.

laptop.

C.

desktop.

D.

palmtop

2.

The following components are forms of pointing devices except

A.

mouse.

B.

cursor.

C.

trackball.

D.

touch pad.

3.

Which of the following devices provides permanent storage of information for the future retrieval and use?

A.

Modem.

B.

Light pen.

C.

Sound card.

D.

Memory stick.

4.

The process of putting the computer into a state of readiness for operation is referred to as

A.

booting.

B.

loading.

C.

locating.

D.

starting.

5.

The operating system is a type of

A.

system software.

B.

program software.

C.

application software.

D.

communication software.

6.

The duplication of an original document is referred to as

A.

backup.

B.

copying.

C.

back down.

D.

production.

7.

The following techniques are primary sources of data collection except

A.

surveys.

B.

interviews.

C.

information.

D.

questionnaire.

8.

Which of the following reasons best describes copyright protection?

A.

To copy intellectual properties.

B.

To hide intellectual properties.

C.

To keep intellectual properties.

D.

To protect intellectual properties.

9.

The combination of letters and numbers as used in computing environment is termed

A.

letters.

B.

characters.

C.

alphanumbers.

D.

alphanumeric.

10.

A set of cells in the vertical directions in a spreadsheet application is called

A.

row.

B.

sheet.

C.

column.

D.

active cell.

11.

The software that manages the communication between the hardware and the application software is

A.

open office.

B.

Microsoft office.

C.

utility software.

D.

operating system.

12.

Which of the following data measuring units is not in the computer field?

A.

Gigabyte.

B.

Kilobyte.

C.

Megabyte.

D.

Zingabyte

13.

The following options are computer output devices except

A.

monitor.

B.

printer.

C.

scanner.

D.

projector.

14.

One megabyte of data is approximately equal to

A.

1,000 bytes of data.

B.

10,000 bytes of data.

C.

100,000 bytes of data.

D.

1,000,000 bytes of data.

15.

Which of the following options will lead to warm booting?

A.

Log off.

B.

Turn off.

C.

Restart.

D.

Hibernate.

16.

An operating system has all the following features except

A.

icons.

B.

scroll bar.

C.

system tray.

D.

wallpaper.

17.

Which of the following tools gives the user a log of all opened applications?

A.

Task bar.

B.

Title bar.

C.

Start menu.

D.

wall paper.

18.

Which of the following options is not a safety measure?

A.

Danger

B.

Security

C.

Anti-virus

D.

protection

19.

The following options are possible health hazards of prolonged use of the computer systems except

A.

numbness.

B.

eye strain.

C.

good vision.

D.

back pains.

20.

The practice of copying and distributing information without the permission of the owner is known as

A.

spam.

B.

piracy.

C.

privacy.

D.

copyright.

21.

To edit a word document, the user must first

A.

bold the word.

B.

format the word.

C.

select the word.

D.

underline the word.

22.

The acronym ISP stands for

A.

Internet system provider.

B.

Internet service provider.

C.

Information system provider.

D.

Information service provider.

23.

A tool for locating information on the internet is called

A.

website.

B.

web browser.

C.

search engine.

D.

information search.

24.

In computing, an element which links one document to another or within the same document is referred to as a

A.

pointer.

B.

hyperlink.

C.

web page.

D.

web browser.

25.

It is appropriate to use a backup when the original file is

A.

new

B.

lost

C.

fresh

D.

intact

26.

A user can arrange icons by
I. Date
II. Type
III. Name
IV. Colour

The correct option by which the user can arrange the icons are?

A.

I and II only

B.

I, II and III only

C.

I, II and IV only

D.

II, III and IV only

27.

A teacher who uses a video to teach students is making use of ICT in

A.

education.

B.

communication.

C.

entertainment.

D.

advertisement.

28.

To center text in a word processing application, use the keyboard keys combination

A.

Ctrl + U.

B.

Ctrl + L.

C.

Ctrl + E.

D.

Ctrl + B.

29.

The keyboard keys combination that will allow a user to move from the current cursor position in a word document to the beginning of the first line of the first page is

A.

Ctrl + end.

B.

Ctrl + tab.

C.

Ctrl + home.

D.

Ctrl + page up.

30.

The justify command will align the selected text to

A.

the left of the margin.

B.

the right of the margin.

C.

the center of the margin.

D.

both left and right of the margin.

31.

The align centre command will place the selected text at the center of the

A.

page.

B.

print.

C.

window.

D.

screen.

32.

Highlighting a text is similar to

A.

editing the text.

B.

selecting the text.

C.

formatting the text.

D.

paragraphing the text.

33.

Which of the following menu options contains the print command in word processing application window?

A.

File

B.

Edit

C.

View

D.

Format

34.

The keyboard shortcut keys for printing a document is

A.

Alt + P.

B.

Ctrl + P.

C.

Alt + print.

D.

Ctrl + print.

35.

The set of rules that enables different types of computers and networks on the internet to communicate with one another is the

A.

internet.

B.

network.

C.

protocol.

D.

communication.

36.

Which of the following computer components is used to display the desktop icons?

A.

Mouse

B.

Monitor

C.

Joystick

D.

System unit

37.

Computer devices such as mouse and joystick are referred to as

A.

output devices.

B.

network devices.

C.

pointing devices.

D.

standard devices.

38.

The intersection of a row and a column is called

A.

cell

B.

data

C.

formula

D.

worksheet

39.

The spreadsheet cell that a user works in at any given time is called

A.

active cell.

B.

inactive cell.

C.

adjacent cell.

D.

working cell.

40.

Cell address is normally displayed in the

A.

title bar.

B.

status bar.

C.

name box.

D.

formula bar.

THEORY QUESTIONS

1.

Study Figure 1 carefully and use it to answer questions (a) to (e).

a)

Write the name of the application displayed in Figure 1

b)

Mention two things that the application identified in Figure 1 can be used to create.

c)

Write the name of the parts labelled A, B, C, D, E and F in Figure 1

d)

List two of items found in the part labelled A

e)

What is the part labelled D used for?

Show Solution
2.

a)

State two reasons for copyright protection.

b)

List four products that normally requires copyright protection.

c)

Outline the steps involved in restoring a deleted file.

Show Solution
3.

a)

Write the following acronyms in full:

i)

CD

ii)

CPU

iii)

DVD

b)

Explain the following terminologies as used in computing.

i)

Data

ii)

Computer

Show Solution
4.

State the steps involved in performing the following operations:

a)

Saving a newly created document in word processing application using the appropriate menu command.

b)

Cutting and pasting a word document from one folder into another folder all on the desktop.

Show Solution
5.

State the function of each of the following e-mails terminologies.

a)

To: .......................

b)

Subject: ...................

c)

Carbon Copy (CC): .....................

d)

Blind Carbon Copy (BCC): ...................

Show Solution

SponsoredAdvertise