Computing Mock 2 - 2024
Computing Mock 2 - 2024
Computing Mock 2 - 2024
Each question is followed by four options lettered A to D. Find the correct option for each question and shade in pencil on
your answer sheet the answer space which bears the same letter as the option you have chosen. Give only one answer to
each question.
Think carefully before you shade the answer spaces; erase completely any answers you wish to change. Do all rough work
on this question paper.
2. Which component on the motherboard allows 7. Which device scans texts on a hardcopy
communication between the CPU and the material and converts them into an editable
system memory? format on the computer?
A. DIMM slots A. Optical Mark Reader
B. Optical Character Reader
B. IDE connector
C. Touchpad
C. Northbridge D. Quick Response (QR) Code Reader
D. Southbridge
14. Designing workspaces and devices to 21. What is the best position for a laptop screen
minimize stress and potential injuries is termed for your neck?
as A. Slightly higher than eye level
A. Health B. Slightly higher than eye level
B. Safety C. On a desk, level with your hips
C. Ergonomics D. At the same height as your eye
D. Economics
22. Google Docs or Microsoft Word allows you
15. Technologies designed to help people with to:
disabilities interact with the world are called A. create, edit, share and store forms for
A. Adaptive technologies user input.
B. Disability technologies B. create, edit, share and store spreadsheet
C. Traumatic technologies documents.
D. Autistic technologies C. create, edit, share and store webpages
and sites.
16. A way of grouping several files so they act D. create, edit, share and store word-
like one file can be achieved by… processing documents.
A. Defragmenting them
B. Fragmenting them 23. What functionality does the ruler in a word
C. Partitioning them processor provide?
D. Zipping them A. Defines the size of the page.
B. Shows the position of your cursor in the
document.
17. What is the full meaning of blog as used in C. Measures the width of a table.
online services? D. Creates boundaries or margins inside
A. Blogger which you add the contents of your
B. B logging document.
C. Web logging
D. Web blogger
24. Which command allows you to change the 31. Which of these provides a gallery of text
document file type? styles?
A. New A. Font
B. Copy B. Clipart
C. Save C. Text tool
D. Save As D. WordArt
25. Changing the existing document is known as 32. Which slide layout typically begins a
what? presentation?
A. Editing A. Title slide
B. Entering B. Title and content
C. Re-typing C. Comparison
D. Selecting D. Two content
26. If you were creating a flyer to advertise for a 33. When one slide moves to the next with
dance, which of these will you use? "movement" - that is called _____
A. Access A. Animation
B. Excel B. Clipart
C. PowerPoint C. Slide movement
D. Publisher D. Transition
27. Which menu or tab contains the command for 34. A device used to connect several computers to
Page Numbers in Microsoft office? form a LAN is called?
A. Home A. Switch
B. Design B. Gateway
C. Insert C. Bridge
D. Mailings D. Router
28. A small square on the bottom right corner of a 35. Which of the following is not a role of a
selected cell is called ____ router?
A. Function A. A router sends data to a specific
B. Formula destination on a network.
C. Fill Handle B. A router can assign MAC addresses.
D. Cell C. A router can assign IP addresses.
D. A router can connect a local network to
29. To select multiple non-adjacent cells in a the internet
worksheet, click in the cell while holding the
A. Alt key 36. Select the incorrect statements about IP
B. Ctrl key address:
C. Shift key A. IP addresses can be static or dynamic.
D. Shift + Alt key B. IP address can be written in ipv4 and
ipv6
30. When a formatted number does not fit within C. IP address is allocated by device
a cell, it displays manufacturer
A. ###### D. IPv4 address is separated with colons
B. #DIV/0!
C. #DIV/1. 37. Each individual page of a website is called __
D. #VALUE A. page
B. web data
C. webpage
D. web slide
38. What is the role of encryption in information 40. The spelling and grammar of a programming
security? language
A. It protects data from unauthorized access A. Diction
or theft. B. Vocabulary
B. It makes data more easily accessible to C. Syntax
unauthorized users. D. Word wall
C. It has no impact on the security of
information.
D. It slows down the processing speed of
the system.
END OF PAPER
SECTION A
[24 MARKS]
Answer Question 1
[Compulsory]
1. (a) Study the diagrams below carefully and used it to answer questions (a)(i-iv)
A 191.23.12.12 B 193.192.12.1
5 25
C 18.1.12.125
(i) What is the name of the figures in each of the diagrams illustrated above.
…………………………………………………………………………………………………
[2 marks]
(ii) Mention the class to which each of the diagrams labeled A, B, and C above belong.
A: …………………………………………………………………………...……………
B: …………………………………………………………………………...……………
C: …………………………………………………………………………...……………
[3 marks]
(b) (i) Which of the versions do the classes mentioned in 1aii belong, IPv4 or IPv6?
Give a reason for your answer
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[2 marks]
(ii) Write down the host portions found in each of the diagrams labeled A, B, and C above.
A: …………………………………………………………………………...……………
B: …………………………………………………………………………...……………
C: …………………………………………………………………………...……………
[3 marks]
(c) Explain the difference the internet and the world wide web (www).
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[4 marks]
(d) (i) State two computer threats than can cause data corruption.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
2 marks]
(ii) Explain one way to prevent the threats stated in 1c above.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[2 marks]
(e) (i) What are the four major classes of threats to a computer system?
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[4 marks]
(f) State two reasons why it is good to send a ciphertext instead of a plaintext over the internet.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[2 marks]
SECTION B
[36 marks]
Answer three questions only from this section.
A
C B
(c) What are the three indent markers found on the ruler of a word Processors?
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[3 marks]
3. (a) Explain the following terms as used in information security:
i. Authorization:……………………………….………………………………………………….....
…………….………………………………….……………………………………………………
…………………………………………………..…………………………………………………
ii. Authentication …………………………………..…………………………………………………
….………….……………………………….………………………………………………………
……………..………………………………………………………………………………………
[4 marks]
(b) A student wants to look for information on the internet to have solution to a Computing assignment
from school. He opens a web browser but do not know what to do.
(d) State one reason why you will use a document holder when you type, instead of placing the
document on a desk.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[2 marks]
4. State the steps involved in performing the following operations:
.…………………………………………………………………………………………………….…
………………………….…………………………………………………………………………….
………………………..……………………………………………………………………………….
…………..……………………………………………………………………………………………
[3 marks]
5. (a) Explain what will happen to the following cell references when copied to other cells.
i. $D$2.……………………..……..……………………………………………………….............
ii. D$2…….……………………..……….…………………………………………………………
iii. $D2………………………………………………………………………………………………
[3 marks]
(b) The Excel function below adds the values in cells B2 and C2. However, there is an error in the
function. Study it carefully and write down any error you see: =(SUM B2,C2)
.…………………………………………………………………………………………………….…
………………………….…………………………………………………………………………….
………………………..……………………………………………………………………………….
[2 marks]
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
[3 marks]