Share this with others:

2024 BECE Computing Questions & Answers (PDF)

Computing Paper 1

 
QUIZ START

Results

🎉 Well done! You’re ready for the next Computing paper.

Keep practicing! Try again to improve your score.

#1. The social media platform that allows members to post questions, start a discussion or contribute to various discussions is

#2. A user who selected 4×3 in the insert table grid in a Word document will insert

#3. In pseudocode, the keyword FOR indicates

#4. Collaborative robot is a category of robots that

#5. Four students in a class wrote the following function in Microsoft Excel. Which of the functions written by the students will return an output?

#6. The peripheral device shown in Figure 1 is used to capture

Figure 1
Figure 1

#7. In a computer shop, the attendant advised a customer to buy the fifth generation computer due to its feature that uses

#8. A teacher sends class assignment to his students using an e-mail. The protocol used by the e-mail to send the assignment over the internet is

#9. A user is to apply predefined formatting styles to texts in Microsoft PowerPoint application. The best features to use is

#10. A teacher tasked students to demonstrate an activity using a flowchart diagram. The appropriate symbol to use at the processing stage of the activity is

#11. Computer manufacturing went through series of developmental stages with each stage characterized by a unique technological advancement. The use of integrated circuits is a characteristics of the

#12. Good health practice suggests that we take intermittent breaks while working. The importance of taking breaks during prolonged computer use is to

#13. The Merge & Centre button in a Spreadsheet application is used to

#14. A student in the computer laboratory wants to change the style, size and colour of a typeface in Microsoft Word application. The appropriate tool to be used is

#15. The robotic club of a school is to construct a robot to be able to detect objects around it. The most appropriate sensor to be used is

#16. Settings and permissions that are specific to a user and determines the activities the user can perform on windows environment on the computer is known as

#17. A blog has many sections. The purpose of the comment section is to

#18. Social media users can regulate the type of information they share on their pages. Privacy setting which is one of such activities they can regulate is to

#19. In computer programming, debugging is a technique used to

#20. A quiz master asked participants to complete the statement: whiles the Internet Explorer is used to access information from the internet, Windows File Explorer is used to

#21. A computing project work requires students to design a blog for a school. The best item to be used for customizing the blog is the school’s

#22. The examination scores in Computing of a class was entered into a Microsoft Excel worksheet. The appropriate function for finding the largest score in the class is

#23. The Screenshot feature under the Insert Tab of a Microsoft PowerPoint application allows a user to insert a screenshot of

#24. The practice of the use of computers and related electronic resources in an environmentally responsible manner is termed

#25. Cybercriminals can obstruct data in transmission to and from a device or a network using a data threat attack technique called

#26. The introduction of Artificial Intelligence as come with its related ethical concerns such as

#27. A student inserted a picture into a Microsoft PowerPoint presentation and needed to work on the picture to adjust the brightness and contrast to make it more clearer. The best tool to help the student achieve the task is

#28. In a printing industry, the device that uses the mechanism of laying down a transparent dye and melting dots of wax-based ink to produce an output is a

#29. Which of the following services best describes an entrepreneurial opportunity in computer networking?

#30. Arku entered 20 into a computer as quantity of pencils bought. How will the figure be represented in the computer for processing?

#31. A student is watching video from a pen drive using a computer. The process the computer uses to access the video from the pen drive is known as

#32. Cindy was trying to access information from the WAEC website but whenever she enters the URL, it takes her to a different website. Her friend advised that she must ensure the URL entered is correct because it identifies

#33. The concept of Artificial Intelligence’s ability to suggest related information to a user who regularly surfs the internet is referred to as

#34. One of your classmates continuously sends threat messages through social media platforms to you. This act is known as

#35. In Desktop Publishing, a user can create a new document through the following ways except for

#36. The Desktop Publishing feature that best helps a user to align objects, texts and elements in a publication is called

#37. What does the formula = IF(A1>10, “Pass”,”Fail”) do in a Spreadsheet application?

#38. A teacher tasked her students to create a date with year, month and day format. The most appropriate Microsoft Excel function to achieve the date format is

#39. To demonstrate to a class, the steps to be taken to create a PivotTable from a set of data in Microsoft Excel worksheet, click on

#40. The central device that communicates with other network devices and manages resources is a

Previous
Finish

Share this with others:
Follow our WhatsApp channels
📘 Education Updates Teacher, school and exam news 💻 Tech Updates AI, gadgets, apps and digital trends