BECE 2012 ICT Past Question Paper Two

1

Use the diagram below to answer Questions 1(a) and (b)

 
bece-2012-ict-past-question-number-1a-image

(a) Name the parts of the diagram labeled A, B, C, D, E and F
(b) List the five (5) main components of a computer keyboard
(c) Give the stages involved in the information processing cycle
(d) List, in the right order, the steps involved in turning off a personal computer

1.
(a) Name the parts of the diagram labelled A, B, C, D, E and F
A – System Unit
B – Screen / Monitor
C – Speaker
D – Microphone
E – Mouse
F – Keyboard

(b) List the five (5) main components of a computer keyboard
• Alphanumeric keys
• Function keys
• Manipulative / Modifier keys
• Numeric keys
• Navigation keys

(c) Give the stages involved in the information processing cycle
Data Input stage – through input devices such as mouse or keyboard
Data Processing stage – by the computer processor
Information Output stage – through output devices such as screen or printer
Information Storage and/or Distribution stage – on devices such as hard disk / pen drive.

(d) List, in the right order, the steps involved in turning off a personal computer (i) close all Application windows
(ii) click start menu
(iii) click turn off /shut down
(iv) select turn off on the dialogue box and click ok (if asked)
(v) wait for the screen to go off
(vi) turn off the monitor
(vii) switch off main power supply.

2

(a) State the function of each of the following devices

(i) Floppy disk
(ii) Printer
(iii) Scanner
(iv) Uninterruptible Power Supply

(b) Write the following acronyms in full
(i) ALU
(ii) CPU

2. (a) State the function of each of the following devices

(i) Floppy disk – The floppy disk is used to store data/information/ documents, files permanently for future use

(ii) Printer – The printer is used to produce hard copies (on paper) of information stored on a computer Or The printer is used to display information on a computer in hardcopy format

(iii) Scanner – The scanner is used to convert a document or picture into a digital form for storage or processing on a computer.

(iv) Uninterruptible Power Supply
1. It provides immediate temporary power in case of main power supply failure.
2. It provides stable/constant voltage during voltage fluctuation from the main power supply.

(b) Write the following acronyms in full
(i) ALU – Arithmetic Logic Unit
(ii) CPU – Central Processing Unit

3

(a) Explain the following types of software

(i) System software
(ii) Application software

(b) State the

function of each of the following buttons as used in application software
(i) Minimize
(ii) Maximize
(iii) Close

3.

(a)
(i) System software
• System software is a type of computer program that runs a computer’s hardware and application programs.

• The system software is the interface between the computer hardware and user
application programs.
• Examples of system software are the Operating System, BIOS (Basic Input / Output System) and Device Driver Software.

(ii) Application software
• Application software is a type of computer program designed to perform a particular task / set of related tasks.
• Application software must be supported by the operating system in order to function properly.
• Examples of application software include Microsoft Word, Excel and Windows Media Player.

(b)
(i) Minimize
Reduces an open window to an icon or button on the taskbar

(ii) Maximize
Increases the size of a window to occupy the entire screen

(iii) Close
Used to exit /shut down an open application program.

4

(a) Explain internet fraud

(b) State three ways in which ICT can be used in basic education in Ghana

(c) List three devices that may be used when connecting to the internet.

(a) internet fraud
• A crime in which someone (a fraudster) uses the Internet to deprive another person/ entity (the victim) of his/her property, interest, estate, or right.
• The fraudster does this by using a false identity and/or providing false information.
• Some elements of the internet that may be used by the fraudster are chat features of social networks, emails and blogs.
• Some examples of internet fraud are
 Internet dating fraud – Using a false identity on the internet to date and defraud a victim
 Internet charity fraud – Appealing for donations for a fake charitable cause through the internet.
 Internet ticket fraud – Selling fake internet tickets for a social/public event
 Phishing – Sending messages to request personal information to be used for scams.
 Pharming – directing internet traffic to a fraudulent website in order to obtain personal information to be used for scams.

(b) Ways in which ICT can be used in basic education in Ghana
TLMs – ICT tools such as computers and projectors can be used as teaching and learning materials (TLMs) in the classroom
Printing of materials – ICT tools such as computers, printers and photocopiers can be used to prepare and reproduce printed educational materials such as textbooks, examination papers, etc Data collection, processing, and storage – Computers can be used to collate, process and store various kinds of data on pupils, teachers, schools, etc.
Educational Research – The internet and other educational databases can be used for various educational research
Communication – Telephones, internet resources, and other communication technology can be used for communication among students and teachers for educational purposes.
Information – Important educational information can be sent/received through ICT tools such as radio, television and the computer.

(c) devices that may be used when connecting to the internet.
 Router
 Modulator-demodulator (modem),
 HUB,
 Switch
 Bridge
 Proxy and Gateway,
 Network Interface Card (NIC)
 Repeater
 Wireless access point

5

Explain the following terms as used in a spreadsheet.

(a) Worksheet
(b) Active cell
(c) Range
(d) Workbook

5.

(a) Worksheet
 A worksheet is a single electronic sheet / page that contains cells arranged in rows and columns.
 The columns are identified by letters and the rows by numbers.
 The worksheet is used to collect and organize data, perform calculations, draw charts, etc.
 Each cell of a worksheet can contain a number, text or formula.
 A worksheet can be named / renamed to identify it from other worksheets.

(b) Active cell
 The active cell is the selected cell of a worksheet that is affected by changes to the worksheet, such as data entry, editing or formatting.
 It is identified by its column letter and row number, for example, B4
 The active cell is that cell whose name appears in the name box just above the sheet.
 The boundary lines of the active cell are thicker than the other cells.

(c) Range
 A range is a group of highlighted cells of a worksheet.
 The range is referenced by the cell from which the highlighting started.
 Apart from data entry, editing and few exceptions, any changes made to the worksheet apply to all the cells within the range.
 The range has a thicker outline/ border around it.

(d) Workbook
 A workbook is a file containing a collection of worksheets that you can use to organize various kinds of information.
 It usually contains related information on its different worksheets.
 It can be named/renamed to identify it from other workbooks.

End Of Paper

End of BECE 2012 ICT Past Question Paper Two, Thank you for visiting this page, if any spelling mistake or wrong answers are spotted kindly notice us in the comment section below remember to share page to friends and famillies who may need it

0 0 vote
Article Rating
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments

BECE

Answers