c. Explain what pseudocode is in programming.
SECTION B (2 marks)
[36 MARKS]
Answer only three questions from this d. During a cybersecurity lesson, Kofi learns
section. All questions carry equal marks. about encryption and decryption. Differentiate
between these two terms in the context of
2. a. Kofi, a senior high school student, notices information security. (4 marks)
that he and his friends spend a lot of time on
social media. State four negative issues Kofi and
his friends might encounter when using social
media platforms. (4 marks)
5. a. Explain the following concepts as used in
b. You prefer using WhatsApp over SMS to programming.
communicate with your friends. State two i. Constant (2 marks)
possible reasons for your preference. (2 marks) ii. Variable (2 marks)
b. How would you define a robot to basic 7
c. Imagine your computing teacher introduced pupils in your school? (2 marks)
the concept of modification attacks in a recent c. List three health hazards and suggest one
class on information security. Explain what a safety precaution each when using ICT tools.
modification attack means in this context. (6 marks). A device commonly used to control
(2 marks) movements in computer games, resembling a
vehicle’s gear, is called:
d. A basic 7 pupil is considering buying a new A. Trackball
device for his studies. Give him four examples B. Keyboard
of portable computing devices he could use. (4 C. Light Pen
marks) D. Joystick
2. A type of screen technology often used in
3. a. John and his friends are concerned about computers and televisions, known for its flat
their school’s data storage system. Provide three display, is:
examples of physical data threats that their A. Keyboard
school’s system might face. (3 marks) B. Monitor
C. System Unit
b. You want to send an assignment to your D. Scanner
teacher via email. List the steps you would 3. Which of these operators is used to raise one
follow to attach the document to your email. (6 number to the power of another and compute the
marks) result?
A. Exponentiation
c. A basic 8 pupil is studying the OSI Model in B. Division
his computing class. What are the first three C. Modulus
layers of the OSI Model? (3 marks) D. Multiplication
4. Which component is responsible for
4. a. Your teacher introduced fifth-generation performing tasks that mimic the movements of a
computers to the class. State three unique human arm using palms and fingers?
features of these computers that you learnt A. Sensor
about. (3 marks) B. Actuator
C. Microprocessor
b. Ama is working on a research project. Write D. Cables
three search engines that Ama could use for her 5. A person with hearing impairment is someone
project. (3 marks) who is unable to:
A. See
B. Hear C. WeChat
C. Speak D. Tumblr
D. Walk 13. In the study of computer generations, which
6. Kofi is learning about social media and its component is primarily associated with the
uses. Which of the following is NOT a fourth generation of computers?
beneficial area of social media? A. Microprocessor
A. Communication B. Vacuum tubes
B. Marketing C. Semi-conductors
C. Phishing D. Transistors
D. Data Sharing 14. While learning about algorithms, it is
7. Ama is setting up a computer network for her important to note a key characteristic. What is
school. In a star topology, how are all the this characteristic?
computers connected? A. Complex in nature
A. To a central device B. Comes with ambiguity
B. To several nodes C. Clear and unambiguous
C. In a parallel connection D. A programming language
D. In series of many cables 15. When studying information security, which
8. During a class on the internet, John learns that of the following is considered a core principle?
the World Wide Web is the part of the internet A. Infrastructure
that contains what? B. Communication
A. Computer connections C. Integrity
B. The internet core D. Vulnerability
C. Network devices 16. While working on a document, you need to
D. Websites quickly select all the text. Which keyboard
9. Sarah is searching for online learning shortcut would you use to achieve this?
platforms. Which of the following websites is A. Ctrl + C
NOT an open learning platform? B. Ctrl + F
A. Alibaba C. Ctrl + Z
B. Coursera D. Ctrl + A
C. Udemy
D. Khan Academy 17. In a lesson on computer networks, a small,
10. Kofi is reviewing online articles, but some personal network that is typically used by one
lack credibility because the authors don’t reveal individual or a small group is being discussed.
their identities. What is this issue related to? What is the term for this type of network?
A. Authority A. CAN
B. Coverage B. MAN
C. Currency C. PAN
D. Objectivity D. WAN
11. A user is seeking a social media platform 18. In a computer science class, you are learning
designed for professional connections and job about the instructions that direct the computer
networking. Which platform best serves this system’s operations. What are these instructions
purpose? collectively called?
A. Facebook A. Program
B. Snapchat B. Hardware
C. X C. Java
D. LinkedIn D. Operating System
12. To send an important document through 19. While working on a research project, a
email, which of the following is an example of student needs to use word processing software.
an email service provider that can be used? Which of the following would be an appropriate
A. Dropbox choice?
B. Outlook A. Excel
B. Google Docs C. Publisher
C. Publisher D. Word processing
D. Adobe Reader 27. In MS Word, which tab contains the option
20. During a robotics competition, a robot is to change the document to portrait orientation?
required to pick up and manipulate objects. A. Insert
What is the primary function of the robot’s B. Home
grippers? C. Page Layout
A. To provide mobility D. Mailings
B. To generate motion 28. Which of the following is NOT a symptom
C. To manipulate and grasp objects of eye strain?
D. To detect the robot’s surroundings A. Itchy eyes
21. A student is conducting research and needs a B. Heaviness on eyelids
search engine that is focused on academic and C. Red eyes
educational content. Which of the following D. Well-focused eyelids
search engines would be the most suitable? 29. In the expression a+b*c, which mathematical
A. Bing operation will be executed first following
B. Yahoo! standard operator precedence?
C. Google Scholar A. Addition
D. Ask B. Multiplication
22. While editing a document, you want to C. Both operations
quickly select an entire word. What action D. Depends on the programming language
would you take on the word to select it? 30. What does MICR stand for in computing?
A. Double-click A. Magnetic Ink Character Recognition
B. Triple-click B. Magnified Ink Character Recorder
C. Single-click C. Magnetic Induced Character Recognition
D. Quadruple-click D. Magnified Induced Composite Recognition
23. A user needs a location to organize and store 31. Which hardware device is specifically used
programs, files, and sub-directories on their to print vector graphics?
computer. What is this location called? A. Printer
A. Files B. Plotter
B. Documents C. Scanner
C. Programs D. Barcode reader
D. Folders 32. In a computing class, a lesson is being taught
24. In a chemical process, which sensor is most on the evolution of computers. The focus is on
suitable for determining whether a solution is the generation that replaced vacuum tubes with
acidic or basic? more efficient components. Which generation of
A. Pressure sensor computers is this?
B. Gas sensor A. Microprocessors
C. pH sensor B. Vacuum tubes
D. Light sensor C. Transistors
25. Consistently staring at phone screens or D. Integrated circuits
computer monitors can lead to which of the 33. When comparing machine intelligence to
following issues? human intelligence, which of the following is
A. Repetitive strain injury the primary advantage that machines have over
B. Stress humans?
C. Thrombosis A. Processing large data quickly
D. Eye strain B. Clear creativity
26. Which software program includes a feature C. Emotional intelligence
called the ‘name box’? D. Abstract reasoning
A. Browser 34. During a programming session, a student
B. Spreadsheet needs to raise one number to the power of
another. Which operator is commonly used for C. Flash Drive
exponentiation in most programming languages? D. Blu-Ray Dis
A. ^
B. **
C. pow()
D. exp()
35. The flowchart symbols in programming that
represents the flowline is called a/an …..
A. Oval
B. Rectangle
C. Arrowhead
D. Diamond
36. While writing a program, the order in which
different mathematical operations are performed
is crucial. What concept ensures that these
operations are executed in the correct order?
A. To define the order in which operations are
performed
B. To determine the data types of variables
C. To control the flow of execution
D. To define constants
37. You are looking for a storage device that
combines the speed of flash memory with the
capacity of a conventional hard disk. What type
of storage device would meet this requirement?
A. Hard disk drive
B. Hybrid hard drive
C. Solid State Drive
D. Flash memory
38. Quantum computing is being applied to
various fields, but it is not suitable for every
application. Which of the following is NOT a
practical use of quantum computing?
A. Playing video games
B. Weather forecasting
C. Database searching
D. Molecular modelling
39. An organization is seeking devices to help
individuals with visual impairments. Which
device would be most appropriate to assist
them?
A. Monitor
B. Braille embossers
C. Microphone
D. Keyboards
40. A user needs to store a large amount of data
on a device that uses light to read and write
information. Which of the following storage
devices would meet this requirement?
A. Hard Disk
B. Floppy Disk