Hit enter after type your search item
Bece Past Questions and Answers

Solve and Download BECE Past Questions & Answers Free Online…

BECE Past Questions & Answers 2013 (ICT)

CLICK TO VIEW ANSWERS TO PART 2
June 2013

INFORMATION AND COMMUNICATION TECHNOLOGY 2

SOLUTIONS

ESSAY

1. (a) (i) Application program used
Spreadsheet application or Microsoft Excel
or Lotus 1-2-3

(ii) Parts
I II III – Column
– Cell
– Row

(iii) Formulae used in the cells
D2 =B2*C2
D5 =SUM(D2:D4) or =D2+D3+D4
D6 =10%*D5 or =0.1*D5 or =D5/10

(b) (i) The diagram
A computer keyboard

(ii) Parts
A

– SHIFT Key
B – Space bar
C. – Arrow keys or movement keys
D – Enter key or Return key
E – Function keys

(iii) PART FUNCTION
B – To create a horizontal space in a text
C – To control the cursor or move the cursor in a different direction
or
To scroll through documents

(c) Function of diagram in b (i)
To input data and/or commands into a computer
Or
To enter data characters (numbers, letters and/or symbols) and commands into a computer

2. (a) (i) positive uses of the internet
• Education – through distance learning, e-books, e-learning centres, etc
• Entertainment – through music, sports, movies, and games
• Information – Easy dissemination of and access to information – through search engines, blogs, news websites, etc
• Communication – through emails, chats, social networks, etc
• Trading (buying and selling) – through credit or debit cards, money transfer services, etc
• Payment of bills – through credit or debit cards, money transfer services, etc
• Advertising of products and services.

(ii) negative uses of the internet
• Stealing / Theft – through hacking, impersonation, deception or other means.
• Creation of malicious software (malware), such as viruses, worms or Trojan horses, to damage or disrupt a computer system
• Copyright infringement – Violating the rights of others by unauthorized use or copying of their creative works.
• Hacking / Cracking – Tapping into confidential data in the computer systems of others without permission for various reasons.
• Pornography – publishing or viewing pornographic pictures or movies.
• Infringement of privacy – Accessing other people’s private information
without their permission.

(b) Storage media
• Hard disc drive
• External hard drive
• DVD
• CD
• Flash drive (pen drive)
• Memory card
• Magnetic tape
• Zip drive
• Floppy disk

3. (a) Communication as used in the computer industry
Transfer or exchange of information between or among two or more persons via a media,
such as the mobile phone or a communication network
Or
Sending and/ or receiving information through a given media, such telephone or the
internet.

(b)
Video conferencing
Holding a meeting through video and audio signals
Or
A meeting in which the participants are in different places but are connected by video and
audio links
Or
Using video and audio signals to link participants at different and remote locations
Or
Live video and audio communication between three or more locations

(c) Devices associated with video conferencing

INPUT DEVICES
• Video camera
• Webcam
• microphones
• CD/ DVD player
• Cassette player

OUTPUT DEVICES
• Computer monitor
• television
• projector
• loudspeakers
• headphones

DATA PROCESSING
• Computer
DATA TRANSFER
• A Network, such as the internet

(d) Media fo
• r sending and receiving information
Mobile phones
• Landline telephones
• Radio
• Television
• Internet
• Local Area Network (LAN)
• Newspapers
• Magazines

4. (a) When it is appropriate to use in word processing,
(i) copy-and-paste
When data that has already been inputted has to be duplicated (copied) in another
part of the same document or in another document

(ii)
cut-and-paste
When data that has already been inputted has to be moved/ transferred to another
part of the same document or to another document.

(b)
(i)
A font
A set of letters, numbers and symbols that share a unified design
Or
A complete set of type or printed or screen characters of the same design

(ii)
Font styles
 Times New Roman
 Arial
 Tahoma
 Cambria

 Calibri
 Brush Script
 Verdana
 Monotype Corsiva
 Britannic Bold
 Broadway
 Georgia
 Castellar
 Lucida Calligraphy
 Algerian

5. (a) (i) Motherboard
The main circuit board of a computer
Or
The circuit board in a minicomputer or microcomputer through which all signals
are directed
Or
A printed circuit board containing the principal components of a microcomputer
or other device, with connectors into which other circuit boards can be slotted

(ii)
Ergonomics
The design of workplace or equipment for comfort, efficiency, safety and
productivity
Or
Factors or qualities in the design of workplace or equipment that contribute to
comfort, efficiency, safety and productivity

(iii)
Menu bar
A horizontal bar usually displayed at the top of a computer screen or window,
listing available menus for an application
Or
A horizontal strip at the top of a window that shows the menus available in a
program

(b) What copyright is used for
 to promote the progress of science, technology and the arts
 to encourage the creation of new and improved intellectual works
 to prevent the unlawful / unauthorized use and/or duplication of creative works
 to protect the interests of the authors/creators of intellectual property

This div height required for enabling the sticky sidebar
Ad Clicks : Ad Views : Ad Clicks : Ad Views :