BECE 2012 ICT – Paper One

1. The device that converts computer output into displayed images is the
A. hard disk
B. monitor
C. printer
D. processor

B. monitor

 

2. The least number of input devices that a computer system can have is
A. 1
B. 2
C. 3
D. 4

A. 1

 

3. Which of the following devices has the largest storage capacity
A. Compact disc
B. Digital versatile disc
C. Floppy disk
D. Hard disk

D. Hard disk

 

4. The device used to ensure a constant flow of power supply to a computer system is the
A. stabilizer
B. step-down transformer
C. step-up transformer
D. uninterruptible power supply

D. uninterruptible power supply

 

5. The total number of command buttons on the title bar of an opened word processing window is
A. 2
B. 3
C. 5
D. 6

B. 3

 

6. Processed or transformed facts which are meaningful to the user is called
A. data
B. information
C. input
D. output

B. information

 

7. The following are possible health hazards of prolonged use of the computer system except
A. back and neck pains
B. eye strain
C. tuberculosis
D. wrist pains

C. tuberculosis

 

8. Which key on the keyboard is used to erase characters from right to left in word processing application?
A. Backspace
B. Delete
C. Insert
D. Pause

A. Backspace

 

9. The key on the QWERTY keyboard used to produce alphabetic upper case letters is
A. Caps Lock
B. Home
C. Num Lock
D. Tab

A. Caps Lock

 

10. Given sizes and designs of letters, numbers and symbols that are displayed in a word processing document are referred to as
A. align
B. bullet
C. font
D. indent

C. font

 

11. Which of the following is a tool on the drawing toolbar of a word processing program?
A. Align
B. Bold
C. View
D. Oval

D. Oval

 

12. When an image is copied, it first goes to the
A. clip art
B. clipboard
C. my document
D. recycle bin

B. clipboard

 

13. To press the letter J, which finger is appropriate to use on a QWERTY keyboard?
A. Left index finger
B. Left middle finger
C. Right index finger
D. Right middle finger

C. Right index finger

 

14. The internet is a
A. global network of computers
B. government agency that links computers
C. software for designing programs
D. special network of computers in an office

A. global network of computers

 

15. The computer equivalence of a sheet of paper divided into rows and columns in the office suite is called
A. database
B. electronic sheet
C. spreadsheet
D. word processor

C. spreadsheet

 

16. The temporary working memory of a computer system is the
A. arithmetic logic unit
B. flash memory
C. random access memory
D. read only memory

C. random access memory

 

17. The software responsible for the management of the basic operations of the computer is the
A. application program
B. device drivers
C. operating system
D. utility program

C. operating system

 

18. The bar on the desktop which displays opened applications and other icons is referred to as
A. scroll bar
B. taskbar
C. title bar
D. toolbar

B. taskbar

 

19. The act of pressing a computer mouse button twice quickly without moving the mouse is termed
A. double clicking
B. right clicking
C. single clicking
D. normal clicking

A. double clicking

 

20. The following are good practices in the computing environment except
A. copyrighting of software
B. designing of cards
C. networking of computers
D. pirating of software

D. pirating of software

 

21. Which of the following software can be used to enhance teaching and learning through the use of pictures, video and sound?
A. Multimedia software
B. Network software
C. Programming software
D. Utility software

A. Multimedia software

 

22. The total number of keys on a standard QWERTY keyboard is
A. 96
B. 104
C. 108
D. 116

B. 104

 

23. Which of the following is a valid folder name?
A. Black/Stars
B. Black_Stars
C. Black:Stars
D. Black*

B. Black_Stars

 

24. A program on the computer which enables users to type letters to friends is the
A. browser
B. spreadsheet
C. utility
D. word processor

D. word processor

 

25. The command that enables the user to save a previously saved document under a new name is
A. new
B. rename
C. save
D. save as

D. save as

 

26. The standard toolbar contains buttons that
A. close and resize windows
B. control page margins and tabs
C. perform the most common tasks
D. help users to navigate through the document

C. perform the most common tasks

 

27. To see exactly how the pages of a current document will appear when printed, the command given is the
A. page setup command
B. print command
C. print preview command
D. view command

C. print preview command

 

28. A tool for locating information on the internet is the
A. database engine
B. internet browser
C. search engine
D. web browser

C. search engine

 

29. An entity in a file system which contains a group of files is called a
A. cabinet
B. container
C. document
D. folder

D. folder

 

30. The creation of a copy of data on a computer system for safe keeping externally is referred to as
A. data backup
B. data entry
C. data filtering
D. data restoration

A. data backup

 

31. The letter that normally represents the floppy disk in an operating system is
A. A
B. C
C. D
D. E

A. A

 

32. Recycle bin or trash bin contains deleted files and folders from the
A. floppy disk
B. flash disk
C. hard disk
D. zip disk

C. hard disk

 

33. Keys on a computer keyboard which are used to move the cursor in a specified direction are called
A. arrow keys
B. function keys
C. shift keys
D. special purpose keys

A. arrow keys

 

34. To underline a selected text in a word processing program, the keys used are
A. Ctrl + U
B. Shift + U
C. Alt + U
D. Del + U

A. Ctrl + U

 

35. Double clicking on a word in a word processing program selects the
A. document
B. paragraph
C. sentence
D. word

D. word

 

36. All of the following are reasons for using ICT in education except
A. forcing students to learn at others’ pace
B. increasing learner motivation and engagement
C. facilitating the acquisition of basic skills in subject areas
D. enhancing teaching through the use of presentation software

A. forcing students to learn at others’ pace

 

37. In word processing program, lines, block arrows and flow charts are found on which of the following toolbars?
A. Drawing
B. Formatting
C. Picture
D. Standard

A. Drawing

 

38. Which program icon on the desktop leads to the disk drives
A. Internet Explorer
B. My Computer
C. My Document
D. My Network Places

B. My Computer

 

39. Which of the following terms refers to unsolicited emails in the form of advertising or chain letters?
A. Compose
B. Inbox
C. Spam
D. Trash

C. Spam

 

40. Computer virus is capable of
A. enhancing the contents of a file
B. maintaining the computer system
C. making the work of the computer easy
D. slowing down the computer system performance

D. slowing down the computer system performance