Share
2024 J.H.S Computing Mock I

SponsoredAdvertise

::

PAPER 1
OBJECTIVE TEST

[45 minutes]

1.

Which of the following statements are true?

I. One of the main advantages of ROM is that the information stored on the ROM chip is not lost even when the power to the computer is turned off

II. ASCII is an acronym for American Standard Code for Intelligent Information

III. Compared to desktop computers, laptop computers are portable since all its components are together in one single unit

A.

I and II only

B.

I and III only

C.

II and III only

D.

I, II and III

2.

The speed of processor of a computer is measured in ......

A.

Gigahertz

B.

Baud

C.

BPS

D.

MIPS

3.

The main two components of CPU are ......

A.

Control unit and ALU

B.

ALU and BUS

C.

Control unit and register

D.

Registers and main memory

4.

Consider the statements below:

I: Compilers are software

II: Touch screen monitors are input/output devices

From the statements above, choose the most appropriate answer from the options below

A.

Both I and II are true

B.

Both I and II are false

C.

I is true but II is false

D.

I is false but II is true

5.

Identify the incorrect pair from the following file extensions:

A.

.jpg - graphic file

B.

.ttf - word text file

C.

.wav - audio file

D.

.exe - executable file

6.

Which of the following hardware was used by the first generation computers?

A.

Transistors

B.

Vacuum tubes

C.

VLSI

D.

Integrated circuits

7.

A type of memory that holds the computer startup routine is

A.

cache

B.

RAM

C.

DRAM

D.

ROM

8.

What is a computer network?

A.

A device used to display information on a computer screen

B.

A collection of interconnected computers and devices that can communicate and share resources

C.

A type of software used to create documents and presentations

D.

The physical casing that protects a computer’s internal components

9.

What is internet?

A.

A network of interconnected local area networks

B.

A collection of unrelated computers

C.

Interconnection of wide area networks

D.

A single network

10.

Which of the following is an example of Bluetooth?

A.

wide area network

B.

virtual private network

C.

local area network

D.

personal area network

11.

What are nodes in a computer network?

A.

the computer that routes the data

B.

the computer that terminates the data

C.

the computer that originates the data

D.

all of the mentioned

12.

Which topology requires a multipoint connection?

A.

Ring

B.

Bus

C.

Star

D.

Mesh

13.

What is the term for the data communication system within a building or campus?

A.

MAN

B.

LAN

C.

PAN

D.

WAN

14.

Which network topology requires a central controller or hub?

A.

Ring

B.

Bus

C.

Star

D.

Mesh

15.

Which of the following allows LAN users to share computer programs and data?

A.

File server

B.

Network

C.

Communication server

D.

Print server

16.

The term HTTP stands for?

A.

Hyper terminal tracing program

B.

Hypertext tracing protocol

C.

Hypertext transfer protocol

D.

Hypertext transfer program

17.

Which one of the following is a valid email address?

A.

gmail.com

B.

kuulchat@.com

C.

smark@telecom

D.

info@jobort.com

18.

Which one of the following is not a network topology?

A.

Star

B.

Ring

C.

Bus

D.

Peer to Peer

19.

The term WAN stands for?

A.

Wide Area Net

B.

Wide Access Network

C.

Wide Area Network

D.

Wide Access Net

20.

Which of the following is not a data type in computer programming?

A.

Integer

B.

String

C.

Text

D.

Float

21.

MS-Word is an example of ......

A.

An operating system

B.

A processing device

C.

Application software

D.

An input device

22.

Ctrl, Shift and Alt are called ...... keys.

A.

modifier

B.

function

C.

alphanumeric

D.

adjustment

23.

A computer cannot "boot" if it does not have the ......

A.

Compiler

B.

Loader

C.

Operating system

D.

Assembler

24.

Junk e-mail is also called ......

A.

Spam

B.

Spoof

C.

Sniffer script

D.

Spool

25.

By default, a document uses ...... orientation

A.

Landscape

B.

Portrait

C.

Page Setup

D.

Print View

26.

In HTML, ...... is at the bottom of the page and usually contains disclaimers, copyright information etc.

A.

Header area

B.

Menu bar

C.

Body of the page

D.

Footer area

27.

Which of the following is a Spreadsheet

A.

Microsoft Excel

B.

Microsoft Word

C.

Microsoft PowerPoint

D.

Google Slides

28.

Which software is best for writing a letter

A.

Microsoft Publisher

B.

Microsoft Word

C.

Microsoft Excel

D.

Microsoft PowerPoint

29.

Which software is the most productive for presenting information to other people?

A.

Microsoft Excel

B.

Microsoft PowerPoint

C.

Paint

D.

Microsoft Access

30.

The basic operations performed by a computer are

A.

Arithmetic operation

B.

Logical operation

C.

Storage and relative

D.

All the above

31.

The two kinds of main memory are:

A.

Primary and secondary

B.

Random and sequential

C.

ROM and RAM

D.

All of above

32.

A hybrid computer

A.

Resembles digital computer

B.

Resembles analogue computer

C.

Resembles both a digital and analogue computer

D.

None of the above

33.

Properly arranged data is called ......

A.

Field

B.

Words

C.

Information

D.

File

34.

A computer consists of

A.

A central processing unit

B.

A memory

C.

Input and output unit

D.

All of the above

35.

The word processing task associated with changing the appearance of a document is

A.

Editing

B.

Writing

C.

Formatting

D.

All of above

36.

Algorithm and Flow chart help us to ......

A.

Know the memory capacity

B.

Identify the base of a number system

C.

Direct the output to a printer

D.

Specify the problem completely and clearly

37.

A byte consists of ......

A.

One bit

B.

Four bits

C.

Eight bits

D.

Sixteen bits

38.

A light sensitive device that converts drawing, printed text or other images into digital form is

A.

Keyboard

B.

Scanner

C.

Plotter

D.

OMR

39.

In programming, an error is also known as ......

A.

Bug

B.

Debug

C.

Mistake

D.

Wrong

40.

Graphical pictures that represent an object like file, folder etc. are ......

A.

Task bar

B.

Windows

C.

Icons

D.

Desktop

PAPER 2
ESSAY

[1 hour 15 minutes]

This paper consists of two sections: A and B. Answer Question 1 in Section A and any other three questions in Section B.

1.

Study Figure 1 carefully and use it to answer questions (a) to (k).

Figure 1

(a)

Write the name of the figure shown above ..........................

(b)

Name the parts labelled I, IV, VI, VII, VIII and X

(c)

Describe how to add a new slide

(d)

Which of the labelled parts is clicked in order to make changes to the look of the power point?

(e)

Describe how to duplicate a slide

(f)

What does the part labelled V do?

(g)

What is the extension of a file saved using the above figure?

(h)

Which of the labelled parts is clicked for the slide show?

(i)

Which of the labelled parts is clicked to change the duration of the slides in the slide show?

(j)

The above figure is a type of .................. software.

(k)

State one function each for the parts labelled VII and X

Show Solution
2.

Use the image shown in Figure 2 to answer questions (a) to (e)

(a)

Identify the image shown.

(b)

Identify the parts labelled I, II, III and IV.

(c)

State one feature each for the parts labelled I, II, III and IV.

(d)

State one advantage and one disadvantage each for the parts labelled I, II, III and IV.

(e)

State two hardware for setting up the image shown.

Show Solution
3.

(a)

Define the term computer network.

(b)

State and describe any two computer network types.

(c)

State three benefits of using computer networks.

(d)

State two challenges of using computer networks.

Show Solution
4.

(a)

Define the following terms as applied to computer programming

(i)

Programming

(ii)

Debugging

(iii)

Integrated Development Environment (IDE)

(iv)

Variable

(v)

Constant

(b)

State two computer programming languages.

(c)

Convert the following decimals to binary and hexadecimal

(i)

65

(ii)

165

(d)

Table 1 contains data to be used programming. Complete the table by indicating against each data the data type to be used when writing the programming code.

# Data Data Type
i) Name of a person
ii) Age of a person
iii) Salary of an employee
iv) Date of birth of a person
v) The score of a student
vi) True or false
Show Solution
5.

(a)

(i)

State and explain the four major data threats

(ii)

Explain how each of the major data threats stated in (i) can be prevented.

(b)

Atswei has been given an assignment to research on Ako Adjei, one of the Big Six.

Describe the steps to Atswei on how to research for the information on the internet.

(c)

(i)

State three components of robots

(ii)

State two uses of robots

Show Solution

SponsoredAdvertise

Kuulchat Premium