Professional Documents
Culture Documents
2024 Ned Computer Studies Jce Mock Marking Scheme
2024 Ned Computer Studies Jce Mock Marking Scheme
iii. Detecting Software Problems: System checks can help identify software issues such as
incompatible drivers, corrupted files, or malware infections. Detecting and resolving these issues
promptly can prevent system instability, crashes, and security vulnerabilities.
iv. Maintaining Security: Regular system checks can help ensure that security software such as
antivirus programs, firewalls, and system updates are up to date. This helps protect the system
against security threats such as viruses, malware, and unauthorized access.
v. Preventing Data Loss: Checking backup systems and verifying data integrity can help prevent
data loss in the event of hardware failure, software corruption, or other unforeseen
circumstances. Regular backups ensure that critical data is protected and can be restored if
needed.
vi. Optimizing Resource Usage: Monitoring resource usage and managing background processes
can help optimize system resources such as CPU, memory, and disk space. This ensures that
resources are allocated efficiently and prevents system slowdowns or crashes due to resource
exhaustion.
vii. Compliance and Auditing: For organizations, regular system checks help ensure compliance
with regulatory requirements and internal policies. Auditing system configurations, user access
controls, and security settings helps maintain a secure and compliant computing environment.
(1 mark)
26. a. Why is it important to put a user password on computers
i. Protect the computer from unauthorised use
ii. Protects computer resources
(1 mark)
b. Outline the steps in unprotecting a word document.
i. Click on file (Office button)
ii. The info
iii. Protect/Unprotect Document
iv. Enter the password and press ok
(4 marks)
27. a. Name any two views present in Ms Word?
i. Reading View/Mode iii. Print Layout (View)
ii. Normal View iv. Web Layout (View)
(2 marks)
b. State any two factors to consider when choosing a printer.
i. Print speed iii. Print technology (LaserJet/Inkjet
ii. Printout colour iv. Printer main use
(2 marks)
c. Differentiate transitions from animations as used in PowerPoint presentation.
i. Transitions are effects applied to slide transitions, controlling how one slide transitions to
the next during a presentation while animations are effects applied to individual elements
within a slide, such as text, images, shapes, or other objects
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 5 of 9 J039
ii. They are used to add visual interest and create smooth, professional-looking transitions
between slides while they are used to add movement or visual effects to specific elements on
a slide, making them appear, disappear, or move in various ways during the presentation.
iii. Transitions can include effects such as fades, wipes, slides, or zooms, among others while
animations can include entrance effects (how an object appears on the slide), emphasis
effects (highlighting or drawing attention to an object), exit effects (how an object disappears
from the slide), and motion paths (movement of an object along a specified path).
iv. Transitions are typically applied to the entire slide and affect the transition between one slide
and the next while animations are applied to individual objects or elements on a slide and
can be customized to control the timing, duration, and order of animation effects.
2 marks)
28. a. State any two effects of viruses on computers.
i. May lead to software loss iii. Lead to hardware failure
ii. Lead to data loss iv. Slows down computer operations
(2 marks)
b. Explain the importance of an antivirus in a computer.
Helps to protect computers from being affected by vireses
(2 marks)
29. Explain the impact of computers on the following;
a. Environment
Poor computer waste disposal affects the environment/pollution/emission of harmful gases
(2 marks)
b. Education
i. e-learning iii. digital libraries
ii. helps in teaching and learning
(2 marks)
c. Culture
i. how people communicate, work, create, and interact with information
ii. loss of cultural and traditional values
(2 marks)
30. Briefly explain how you can insert a header in a word document.
i. Go to insert, choose inset header, type the header and click close or just double click outside the
header field
ii. Double click on the very top of the page, type the header, click close or double click anywhere
outside the header field
(3 marks)
Section C (30 marks)
Answer all the three questions in this section in the spaces provided
31. a. Explain any one advantage of using mail merge.
i. Personalization: Mail merge allows users to create personalized documents, such as letters,
emails, or labels, by automatically inserting individualized information from a data source into a
template. This enables organizations to address recipients by name and tailor content to their
specific needs or preferences, increasing engagement and relevance.
ii. Time Efficiency: Mail merge can save time and effort by automating the process of generating
multiple documents with similar content but different data. Instead of manually creating each
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 6 of 9 J039
document separately, users can create a single template and merge it with a data source to
produce multiple personalized documents quickly and efficiently.
iii. Accuracy: Mail merge reduces the risk of errors and inconsistencies that may occur when
manually entering data into documents. By pulling information directly from a data source, such
as a spreadsheet or database, mail merge ensures that the information is accurate and up to
date, minimizing the chances of typos, misspellings, or data entry mistakes.
iv. Consistency: Mail merge helps maintain consistency across multiple documents by using a
single template as the basis for all merged documents. This ensures that all documents have a
consistent layout, formatting, and branding, enhancing professionalism and brand identity.
v. Scalability: Mail merge is scalable and can be used to generate large numbers of personalized
documents efficiently. Whether sending hundreds of personalized letters to customers, generating
customized invoices for clients, or printing individualized labels for mailing lists, mail merge can
handle large volumes of data and documents with ease.
vi. Flexibility: Mail merge offers flexibility in terms of the types of documents that can be created
and the data sources that can be used. Users can merge templates with various types of data
sources, including spreadsheets, databases, and contact lists, to create a wide range of
personalized documents for different purposes, such as marketing campaigns, customer
communications, or administrative tasks.
vii. Streamlined Communication: Mail merge streamlines communication processes by automating
the creation and distribution of personalized documents. Whether sending promotional emails to
a mailing list, generating personalized letters for fundraising campaigns, or creating
individualized certificates for event attendees, mail merge simplifies the process of reaching out
to recipients with targeted messages.
(2 marks)
b. Briefly describe the process of mail merging.
i. Create Your Document Template:
a. Open Microsoft Word and create a new document.
b. Design your document template, including any static text, graphics, or formatting that
you want to appear in all merged documents.
c. Insert placeholders (known as merge fields) where you want the personalized information
from your data source to appear. These merge fields will be replaced with data from your
data source during the merge process.
ii. Start the Mail Merge Wizard:
a. In Microsoft Word, navigate to the "Mailings" tab on the ribbon.
b. Click on the "Start Mail Merge" button and select the type of document you want to
create (e.g., letters, emails, labels).
c. Choose the option to "Step-by-Step Mail Merge Wizard" to guide you through the
process.
iii. Select Your Data Source:
a. In the Mail Merge Wizard, select the option to use an existing data source.
b. Browse for and select your data source file (e.g., Excel spreadsheet).
c. Confirm the worksheet or table within the data source that contains the information you
want to merge.
iv. Insert Merge Fields:
a. In your document template, place the cursor where you want to insert merge fields.
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 7 of 9 J039
b. Click on the "Insert Merge Field" button in the Mail Merge Wizard.
c. Select the fields from your data source that you want to insert into the document. These
fields will be replaced with actual data during the merge process.
v. Preview and Complete the Merge:
a. Preview your merged documents to ensure that the merge fields are correctly populated
with data from your data source.
b. Use the Mail Merge Wizard to navigate through the merged documents and make any
necessary adjustments.
c. Once you are satisfied with the preview, complete the merge process to generate the final
merged documents.
vi. Save and Distribute:
a. Save your merged documents to your desired location.
b. Depending on the type of document you created, you can print them, save them as
individual files, or send them directly via email.
NB: The steps could be written differently provided they explain the process in chronological
order and completes the whole mail merge process
(8 marks)
32. Describe any five factors you would consider when preparing a presentation.
i. Audience Analysis: Understand your audience's demographics, interests, knowledge level, and
expectations. Tailor your content, tone, and delivery style to resonate with your audience and
address their specific needs and interests.
ii. Purpose and Objectives: Clearly define the purpose of your presentation and identify specific
objectives you want to achieve. Determine what key messages you want to convey and what
actions or decisions you want your audience to take as a result of your presentation.
iii. Content Structure: Organize your content in a logical and coherent structure that flows
smoothly from introduction to conclusion. Use clear headings, subheadings, and bullet points to
outline main ideas and key points. Ensure that your content is well-organized and easy to follow.
iv. Visual Design: Choose appropriate visuals, such as slides, images, charts, graphs, and
multimedia, to enhance your presentation and reinforce key messages. Use consistent branding,
color schemes, fonts, and formatting to create a professional and visually appealing design.
v. Engagement Techniques: Incorporate engaging techniques to capture and maintain your
audience's attention throughout the presentation. Use storytelling, anecdotes, examples,
questions, polls, and interactive elements to make your presentation memorable and impactful.
vi. Delivery Style: Practice and refine your delivery style to ensure clarity, confidence, and
authenticity. Pay attention to your tone of voice, body language, gestures, and eye contact. Speak
clearly and at an appropriate pace, and be prepared to adapt your delivery based on audience
reactions and feedback.
vii. Technology and Equipment: Familiarize yourself with the technology and equipment you'll be
using during the presentation, such as presentation software, audiovisual equipment, and remote
control devices. Test your equipment beforehand to ensure everything is working properly and
troubleshoot any potential issues.
viii. Timing and Pace: Manage your time effectively to cover all key points within the allotted time
frame. Practice pacing your delivery and allow time for transitions, audience interaction, and
Q&A sessions. Be mindful of time constraints and avoid rushing through your presentation or
exceeding your allotted time.
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 8 of 9 J039
ix. Feedback and Evaluation: Solicit feedback from colleagues, mentors, or trusted individuals to
review your presentation and provide constructive criticism. Incorporate feedback to refine and
improve your presentation content, delivery, and effectiveness.
x. Contingency Planning: Anticipate potential challenges or disruptions that may arise during the
presentation, such as technical issues, distractions, or unexpected questions. Develop
contingency plans to address these challenges effectively and maintain composure and
professionalism.
(10 marks)
33. Describe any five functions of an operating system (OS).
i. Process Management:The OS manages processes, which are programs or tasks running on the
computer. It allocates system resources (CPU time, memory, and I/O devices) to processes,
schedules their execution, and provides mechanisms for inter-process communication and
synchronization.
ii. Memory Management:The OS manages system memory (RAM) by allocating memory to
processes, ensuring efficient use of available memory, and providing mechanisms for virtual
memory management (swapping data between RAM and disk storage) to extend available
memory capacity.
iii. File System Management: The OS manages file systems, which organize and store data on
storage devices such as hard drives, SSDs, and external storage. It provides file management
operations such as creating, reading, writing, deleting, and organizing files and directories, as
well as ensuring data integrity and security.
iv. Device Management: The OS manages input/output (I/O) devices such as keyboards, mice,
monitors, printers, storage devices, and network interfaces. It provides device drivers to
interface with hardware devices, handles device initialization and configuration, and
coordinates data transfer between devices and processes.
v. User Interface: The OS provides a user interface (UI) that allows users to interact with the
computer system. This can include command-line interfaces (CLI), graphical user interfaces
(GUI), or touch-based interfaces, depending on the OS and user preferences. The UI provides
access to system resources, applications, and settings.
vi. Security and Access Control: The OS implements security mechanisms to protect the computer
system and its resources from unauthorized access, malware, and other security threats. This
includes user authentication, access control policies, encryption, firewalls, antivirus software,
and security updates to mitigate vulnerabilities.
vii. System Performance Monitoring and Optimization: The OS monitors system performance
metrics such as CPU usage, memory usage, disk activity, and network traffic. It provides tools
and utilities for performance analysis, troubleshooting, and optimization to improve system
efficiency, responsiveness, and reliability.
viii. Networking: The OS provides networking capabilities to enable communication and data
exchange between computers and devices on a network. This includes support for network
protocols, configuration of network settings, and management of network connections, such as
wired Ethernet, Wi-Fi, and VPN connections.
ix. Error Handling and Recovery: The OS handles errors, faults, and exceptions that occur during
system operation, such as hardware failures, software errors, or user mistakes. It provides
mechanisms for error detection, recovery, and fault tolerance to minimize system downtime and
data loss.
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 9 of 9 J039
(10 marks)
END OF MARKING SCHEME