Computing — 2024
BECE · 40 questions · Answers included
40 questions
A student in the computer laboratory wants to change the style, size and colour of a typeface in Microsoft Word application. The appropriate tool to be used is
A quiz master asked participants to complete the statement: whiles the Internet Explorer is used to access information from the internet, Windows File Explorer is used to
The concept of Artificial Intelligence's ability to suggest related information to a user who regularly surfs the internet is referred to as
A blog has many sections. The purpose of the comment section is to
In a printing industry, the device that uses the mechanism of laying down a transparent dye and melting dots of wax-based ink to produce an output is a
Collaborative robot is a category of robots that
A student inserted a picture into a Microsoft PowerPoint presentation and needed to work on the picture to adjust the brightness and contrast to make it more clearer. The best tool to help the student achieve the task is
A student is watching video from a pen drive using a computer. The process the computer uses to access the video from the pen drive is known as
What does the formula = IF(A1>10,"Pass","Fail") do in a Spreadsheet application?
A teacher tasked students to demonstrate an activity using a flowchart diagram. The appropriate symbol to use at the processing stage of the activity is
Settings and permissions that are specific to a user and determines the activities the user can perform on windows environment on the computer is known as
Good health practice suggests that we take intermittent breaks while working. The importance of taking breaks during prolonged computer use is to
Four students in a class wrote the following function in Microsoft Excel. Which of the functions written by the students will return an output?
To demonstrate to a class, the steps to be taken to create a PivotTable from a set of data in Microsoft Excel worksheet, click on
In a computer shop, the attendant advised a customer to buy the fifth generation computer due to its feature that uses
The social media platform that allows members to post questions, start a discussion or contribute to various discussions is
The introduction of Artificial Intelligence as come with its related ethical concerns such as
A user who selected 4 x 3 in the insert table grid in a Word document will insert
The Screenshot feature under the Insert Tab of a Microsoft PowerPoint application allows a user to insert a screenshot of
The examination scores in Computing of a class was entered into a Microsoft Excel worksheet. The appropriate function for finding the largest score in the class is
In pseudocode, the keyword FOR indicates
The central device that communicates with other network devices and manages resources is a
A user is to apply predefined formatting styles to texts in Microsoft PowerPoint application. The best features to use is
The robotic club of a school is to construct a robot to be able to detect objects around it. The most appropriate sensor to be used is
A teacher tasked her students to create a date with year, month and day format. The most appropriate Microsoft Excel function to achieve the date format is
Cybercriminals can obstruct data in transmission to and from a device or a network using a data threat attack technique called
A teacher sends class assignment to his students using an e-mail. The protocol used by the e-mail to send the assignment over the internet is
The Merge & Centre button in a Spreadsheet application is used to
Arku entered 20 into a computer as quantity of pencils bought. How will the figure be represented in the computer for processing?
Cindy was trying to access information from the WAEC website but whenever she enters the URL, it takes her to a different website. Her friend advised that she must ensure the URL entered is correct because it identifies
In Desktop Publishing, a user can create a new document through the following ways except for
The Desktop Publishing feature that best helps a user to align objects, texts and elements in a publication is called
One of your classmates continuously sends threat messages through social media platforms to you. This act is known as
A computing project work requires students to design a blog for a school. The best item to be used for customizing the blog is the school's
Computer manufacturing went through series of developmental stages with each stage characterized by a unique technological advancement. The use of integrated circuits is a characteristics of the
In computer programming, debugging is a technique used to
Which of the following services best describes an entrepreneurial opportunity in computer networking?
The peripheral device shown in Figure 1 is used to capture
The practice of the use of computers and related electronic resources in an environmentally responsible manner is termed
Social media users can regulate the type of information they share on their pages. Privacy setting which is one of such activities they can regulate is to