Download as pdf
Download as pdf
You are on page 1of 12
ASANTE MAMPONG MUNICIPAL EDUCATION DIRECTORATE May 2024 COMPUTING 2 & 1 Essay and Objective 2 &1 2 hours Name... Index Number., Signature . Date of Examination .... te) GHANA R(_-4¢-¥)) EDUCATION 7] SERVICE ASANTE MAMPONG MUNICIPAL EDUCATION DIRECTORATE TAL MUNICIPAL MOCK FOR § ren na tn wis May 2024 COMPUTING 2&1 2 hours Do not open this booklet until you are told to do so. While you are waiting, read and observe the following instructions carefully, Write your name, index number, signature, and date of ‘examination in ink in the spaces provided above. This booklet consists of two papers. Answer Paper 2 which comes first, in the booklet and Paper 1 on your Objective Test answer sheet. Paper 2 will last 1 hour 15 minutes. Do not start Paper 1 until ‘you are told to do so. Paper 1 will last 45 minutes. At the end of the examination, submit the entire ion paper 10 the invigilator. “Any candidate who tears off any part of the question paper will be severely penalized. Whether you answer all the questions in this paper or not, hand in the entire question paper 10 the invigilator. For Examiner's Use Only ‘Question Number | Mark SPONSORED BY COHBS ASANTE MAMPONG COMPUTING 261 b PAPER 2 Thour 1Sminu ESSAY [60 marks} This paper is in two sections A and B, Answer Question 1 in Section A and any other questions in Section B. Answer all the guestions in the spaces provided in this question paper, At the end of the examination, you should submit the entire question paper 1o the invigilator. i Any candidate who tears off any part of the question paper will besseverely penalized. Whether you answer ail the questions in this paper or not, hand in the entire question pap to the invigilator. Credit will be given for clarity of expression and orderly presentation of material. SECTION A (24 marks] Answer question 1 [Compulsory] 1. (@)__ The diagram below is an illustration of an algorithm that prints colors. Study it carefully and use it to answer questions (i) to (iv). Ti ® see Global variobles - inkColours = [“Cyan", “Magenta”, "Yellow", “Black"] +e = Subprograms - 5 def displayAll (inList): 6 for index in range (@, len (inList)): 4 " peint (index, intist[index]) a owe = Main Program 2 ne userInput = input (“Would you like to see the colours? aa 1f ((userInput == "y") or (userInput == "¥")): io 2 displayAll (inkColours) 13 else: a print (“Thank you") (i) Which type of data structures are used to hold the ink colors? (ii) Give the contents of the variable inkColors. (0608024 COMPUTING 281 3 (iv) Identify the type of statements used in the main program. [2 marks] (6) The diagram below is an illustration of an algorithm. INPUTC IFC <= 100 THEN, PRINT C ELSE LETC =(C+20"C) PRINT C ENDIF In the space provided below, draw a flowchart of the algorithm above. [5 marks] (© The diagrams below are different icons of commands used to insert multimedia objects in MS Publisher. Use them to answer questions (i) to (iv) er } ' os Turn over (0605024 COMPUTING 281 4 # Give the name of the MS Publisher ribbon tab on which diagrams above can be found. @ (iii) State the use of I, II, III and IV in the diagrams above. — ‘Name four objects that can be created in a publ - labelled I. 5 (b) Give three reasons why images must have a consistent look in a publication. (©) (i) Whatis digital footprint? (ii) Explain the two main types of digital footprint. [3 marks} (@) () Whatisa screenshot? (ii) Write the steps to insert a screenshot in a PowerPoint presentation [4 marks} Turn over (0605024 COMPUTING 281 bheko 6 3. (@)__ Give three tasks you can accomplish with a smart watch, (© (i) Give two examples of data fabrication. (ii) Suggest two ways to mitigate the attack of data fabrication, @ What is cyberbullying? 0605024 COMPUTING 2&1 bheko 7 (a) Outline three negative effects of computer use on the environment [3 marks] (b) Outline four ways of reducing energy consumption when using computers. [4 marks] (©) Distinguish between the concepts of abstraction and decomposition in programming, [2 marks] | (4) Describe how to group shapes in PowerPoint. [3 marks] : Turn over W024 COMPUTING 281 Dbsko — 8 Give three benefits of having copyright protection for your work. (b) Give two ergonomic measures to consider when using a computer. ©) Describe two ways to create a new publication in MS Publisher. DO NOT TURN OVER THIS PAGE UNTIL YOU ARE TOLD TO DO SO. YOU WILL BE PENALIZED SEVERELY IF YOU ARE FOUND LOOKING AT THE NEXT PAGE BEFORE YOU ARE TOLD TO DO SO. PAPER I 45 minutes OBJECTIVE TEST Answer all the questions on your Objective Test answer sheet. 1. Use 2B pencil throughout, 2. On the pre-printed answer sheet, check that the following details are correetly printed: Your surname followed by your other names, ie Subject Name, yout Index Number; Centre Number and the Paper Code. 3. In the boxes marked Candidate Number, Centre Number and Paper Code, reshade each of the shaded spaces. An example is given below. This is for a candidate whose name is Seyram BABANAWO. Her index number is 772384183 and she is writing the examination at Centre Number 77234, Sh 2 i CE CANDIDATES ET. HE CARDOATENAME: ‘SEYRAM BABANAWO ston oy loper and = ® RantShade tough he leer chosen Maar wig aze alven tor = C) (01 = 2. st At ae is toucgoennapaeneiee awe | = Senmenuwoer | [paren coor =_ 3 it = _ 1 fea (1 fo Py 1; és - by fo ba ny Ea} | Stbenisore | — caleape ca fe 2] re] al [ents = = 5 BI cS rl = a ro) ro) a ta ol 3 & 6 Gl = 5 fo em 5 | ame faliel al ” m ny is cc = m e ea = ™ ™ Pp) 1 ma = 605024 COMPUTING 21 10 Answer all the questions. ‘i Each question is followed by four options lettered A to D. Find the correct optic question and shade in pencil on your answer sheet the space which bears the same option you have chosen. Give only one answer to each question. An example is given b ‘A group of files are stored ina A. graphic B. folder CG.” text D. word The correct answer is folder, which is lettered B anid therefore answer space B AS a= oa Gel Think carefully before you shade the answer spaces. Erase completely any answer y chan inge. Do all rough work on this paper. Now answer the following questions. § 1. Which of the following are true about the central processing unit of a computer? 1. The control unit manages the work done by the CPU, es I- The arithmetic and logic unit (ALU) does all the calculations in the CPU. Il- Every time the CPU clock ticks, the control unit sends an instruction IV- When an instruction arrives at the CPU, it goes to the control unit. A. 1, Mand IV only. B. IL, Mand IV only. Cc 1,1, Mand iv. D. Lf and IV only. 2. Which of the following describes artificial intelligence? A. Human beings can think like computers. B. Computers can make human-like judgements, C. Computers are made of artificial components. D. Logical tests are true or false. 3. It ean be helpful to have a fake social media profile in order to make you popular online. share content that everybody will like. share private thoughts, rude or worrying content. allow others to criticize you anyhow. ‘ocial networking sites are sites that are used to post comments about experiences people have. create and share images and videos, make short messages that can be shared with many people at once. connect with family, fiends, new people and people trying to sell things. 5. One big advantage about machine learning is that Pe Pe* (98 A. the computer needs a lot of data, B. data input must be diverse and varied, €. machine learning can never go wrong. D. ___you don’t need to tell the computer how to solve the problem, H 6. The difference between a switch and a hub in a network is that, the messages from & A. switch goes to particular computer(s) but those from a hub goes to all the B. switch goes to all the computers but those from a hub go to Particular com C. switch cannot be sent to any computer but those from a hub ean be sent, D. Switch can be sent to other computers but those from a hub cannot be sent, 7. Which of the following is not a good way to manage your digital footprint? A. Posting just about anything you like. B. Checking occasionally to be sure what your di C. Making sure your private settings are secure, D. Thinking before you post, (0605024 COMPUTING 281 SORPeroRp (9605024 COMPUTING 281 bheko \n algorithm does not involve A. inputs. B. outputs. C. processes. D. _ windows. \ router is used to connect your home to A. the internet. B. the network wirelessly, C. any server anywhere, D. _ as many servers as possible, One disadvantage of cloud service is that A. data is not safe. B. sharing data is difficult. C. files are available anywhere. D. _ it canbe expensive over time. Some of the media used in e-learning include the following except A. games and simulations. B. presentations and audio C. Video and interactive video. D. white board and markers. A computer stores data using A. only digits. B. digits and letters. C. only letters D. characters. The Is and Os inside the computer can be used to store the following except A. YesandNo. B. numbers. C. instructions that tell the computer what to do. D. _ non-digital content, A malware is a software that ‘A. solves other software problems. B. solves hardware problems. C. criminal installs on a computer. D. helps to detect viruses. When a cyberbully circulates rumours. about a target, itis called A. exclusion. sing. D. harassment, A If you become a target of cyberbullying, it is helpful to 1 talk to someone you trust about it. I. avoid telling anyone. f TIL. avoid responding to the bullying. IV. spend some time offline. A. 1, iand IM only. B I and TV only. C. LHL Mand IV, D. TL, Ii and TV only ‘COMPUTING 281 uw 17. 18. 19. 20. 21. 22. 23. 24. One human-like judgement that is hard for artificial intelligence to do is ‘A. recognizing faces. B. detecting sickness. speaking in human way. . checking news in human language. Every file stored on the computer is made up of A. numerical data. B. digital data C. alphanumeric data D. — verbaldata. Symbols and terms used in computer programming are called ‘A. operators. B. values, Cc functions. D. signs Algorithm is a term used to describe ‘A. howa software is created B. the way a program is used. C. _aproblem you want to solve. D. — aplantosolvea problem. You can protect your digital privacy by L changing your password often. Tl. switching off current location. JIL. managing your audience. TV. _ hiding your activity status. A. I,Iand III only. B. [Mand IV only. CUI Mand Iv. D. Ii, Hand IV only. Operators in computer programming are used to A. change values. B. store values. C. change variables. D. __ store variables. The Scratch programming language is A. block-based. B. _ image-based. C. text-based. D. _ audio-based, A search engine takes into consideration I. how popular a page is. Hl, how upto date a page is. Ill. your search history. IV. your personal identity. A. I,Mand 111 only. B. 1, Iland IVonly. C. GI, Wand IV. D. Hi, Hifand IV only Turn over 25. Artificial intelligence can do tasks that 32. requite human-like judgement like Se I. solving complex problems. C. multiple ones, T. driving cars. D. _ one zero and multiple UII. recognizing faces. 33. A column in a data table is TV. diagnosing illnesses. hee it A. I,IMand tonly. ioe B. I, Mand IV only. record. C41, Wand Iv. 34. Web page editor i an app D. ‘Ii, Wand IV only. A. web. 26, A computer cannot use digital file to store a ie pages. he ae create web B. image. i See over Scratch because D. signs. A. text commands 27: Copyright ‘means that any other people can also copy the work freely. x i z must ask for the owner's consent D. _ youmake few errors. to use or share the work. 36. Examples of what a server can C. have right to the work as the 18 owner. D. _can own the work once they get approval ftom the original owner. 28. The piece of software used by search engines to crawl around the web is ealled A. spider. 37. B. browser. C. search master.” D. engine crawler. 29, Data can be shared between two or more computers through 38. A. library. B. network. C. grouping. D. web cluster. 30. The Email server in anctwork ensures that | 3% A. youare connected to the internet. B. _ emails reach the right people. C. documents are saved correctly. D. _ emails are printed correctly. a 31. Habe commands are entered into the f Python shell. x Python file. C. Python folder. D. Python basket. END OF PAPER 0605024 COMPUTING 241 12 A computer file is made up of

You might also like