NCSE ICT Specimen Paper 2017
NCSE ICT Specimen Paper 2017
NCSE ICT Specimen Paper 2017
MINISTRY OF EDUCATION
Student's Name:
School's Name:
----------------
School's Code:
Student's Number:
INSTRUCTIONS
1. This paper consists of forty ( 40) Multiple - Choice questions. Answer ALL questions
on the Multiple-Choice answer sheet provided.
4. Record your answers on the Multiple - Choice Answer Sheet provided by shading the
selected answer completely.
5. If you must change your answer, erase your first answer completely and then shade
your new answer.
7. If you are finished before time is called, go back and check your work.
A. Concussion
B. Wrist strain
C. Ankle strain
D. Fracture
Sitting at the proper desk will allow 5. Marva has several documents to
you to have the correct posture type. She experiences pain in her
hands when typing.
while working. It should be at the
right height to support your arms
How can she prevent this?
while you work at the computer.
A. Place her hands in cold water
B. Use another computer
3. What term does the text relate to? C. Use a wrist rest
D. Place her hands in warm water
A. Economics
B. Ergonomics
c. Biometrics
D. Aesthetics
B.
c.
A. Shrink font
Question 15 refersto the Spreadsheet below. B. Font color
c. Change case
D. Text highlight
A B c D
1
2
3
4
A. Al: C3
B. Al: Cl
C. C2: Al
D. A2: C3
A. Paint
B. Spreadsheet
C. Word processor
D. Access
18. A teacher wants to use the same 22. What is an example of a 'blog'?
background on all his presentation
slides. A. An online diary
Which option would assist him to B. An audio broadcast on the
achieve this?
Internet
C. A text-based 'chatting' system
A. Insert option
D. A place online to send and
B. Design option
receive messages.
C. New slide option
D. Slide layout option
Question 23 refers to the text below.
A. Google
B. Gmail
C. Safari
D. Chrome
FALSE
A. Plagiarism
n
B. Copyright
C. Hacking
D. Fraud
29. Where is the loop condition
checked?
27. What is Anti-virus software used to
A. Position A
protect the computer from?
B. Position B
C. Position C
A. Software threats
B. Hardware threats D. Position D
C. User Misuse
D. Electrical Surges
30. Which flowchart symbol would be
used to represent 'Print' in an
28. Which of the following describes algorithm?
computational thinking skill of
decomposing a problem?
A student wrote the following program script using a special programming language that
moves a triangle on the screen:
start
pen down
move 10
turn right 90
move 10
pen up
When the student clicked 'Start', the following was the output:
31. Using the same programming language from above, which of the following scripts would
draw a square of sides 10 on the screen?
A. start B. start
pen down pen down
move 10 move 10
tum right 90 tum right 90
move 10 move 10
tum right 90
tum right 90
move 10
pen up move 10
tum right 90
move 10
pen up
C. start
pen down D. start
move 10 move 10
tum right 90 tum right 90
move 10 move 10
tum right 90 tum right 90
move 10 move 10
tum right 90 tum right 90
move 10 move 10
tum right 90 pen down
move 10
pen up
A. Section A A. Section A
B. Section B B. Section B
C. Section C C. Section C
D. Section D D. Section D
Set x to 12
Set y to 3 Some students used their phones to
Set a to x - y take inappropriate pictures of
another student. These pictures
34. What is the value of 'a'? were then circulated via social
media to intimidate or threaten the
A. 7 student.
B. 15
C. 4
3 7. What is the term used to describe the
D. 9
actions of the students?
A. Cyberbullying
35. What is a benefit of proper B. Hacking
N etiquette? C. Computer Fraud
D. Blogging
A. Improved performance on online
exams
B. Reduced offensive online
38. Which of the following could put
behaviour you at risk in relation to the Internet
C. Access to informative websites use?
D. Safer navigation of the Internet
A. Keeping your passwords secret
B. Not sharing your current location
36. Sue-Ann sends chain letters to her online
friends online. C. Telling your parents who are
What rule of proper netiquette is your online friends
being disobeyed?
D. Posting your phone number
A. Avoid sarcasm on your profile
B. No spam
C. Identify yourself
D. Be concise 39. As a fourteen year old, you received
a 'friend request' on social media
from a person you do not know.
What course of action should you
take?
11= = = = = = = = = = = = = = = = = = = = = = = = = = =11
I I
I Congratulationslll I
1 From: Information desk [email protected] :
Subject: OW I Global Lottery
I I
I I
I Your email address was selected to claim the sum of $500,000.00 in the Global Lottery. I
I To claim your prize, please contact our agent in Lagos, Nigeria. I
Contact person: Mr. Osi Abubaffa email: [email protected] I
Phone: +1239875456321 ~
END OFTEST