2024 BECE Computing Mock 3 PDF Questions with Answers
This 2024 BECE computing mock 3 pdf questions come with both objective test and theory. All questions are in consonant with the new NaCCA curriculum. Download the full file using the link provided below.
2024 BECE Computing Mock 3 PAPER 1
OBJECTIVE TEST
Answer All Questions
1. Fifth generation of computers used ……
A. microprocessor. B. artificial intelligence. C. vacuum tube based D. integrated circuit based.
2. A cartoon avatar that represents you is called A. Emoji. B. bitmoji. C. filter. D. Flickr.
3. A special photo overlays which are used to dress up a snap is referred to as
A. stickers. B. emojis. C. geo-filters. D. pinboard.
4. Which of the following is true about quantum computing? Quantum computers…..
A. calculateswith cubits. B. have high error rates. C. are well-suited for data analysis.
D. calculates in transistors.
5. To upload images on the photo sharing website, first ………..them so that it is easy to find them while uploading. A. remove B. organize C. create D. delete
6. Posting a picture or a video in Pinterest is known as………….. A. pinning. B. snapping.
C. tweeting. D. living.
7. One of the commonly used photo sharing website is A. Facebook lives B. TikTok
C. Google Photos D. Pinterest
8. To defraud someone or an organization by creating fake documents or modifying an existing document is called A. forgery. B. vandalism. C. plagiarism. D. piracy.
9. Network fabrication attacks the …….of the system. A. confidentiality B. integrity
C. authenticity D. security
10. Which of the following hackers use their knowledge to hack to check their own security
system to make it more hack-proof? A. White hat hacker B. Black hat hacker C. Grey hat hacker D. Red hat hacker
2024 BECE Computing mock 3 questions continue from here
11. The type of threat in which an attacker floods the server resources and exhausts the network bandwidth is known as A. network delivered threat. B. data extortion.
C. blackhole attack. D. data security.
12. The term used to describe a group of individuals who scam users is termed as
A. plagiarism. B. phishing. C. virus. D. malware.
13. Google uses automated programs known as ………which finds pages on the web.
A. crawlers B. meta search C. finders D. searcher
14. Which one of these is used to raise one value to the power of second value and calculates it? A. Exponentiation B. Modulus C. Division D. Multiplication
15. Logical note takes only ……….operand(s). A. zero B. one C. two D. three
16. The errors that occur in MS Excel when the text in the formula is not recognized is ……
A. #### Error B. #REF! Error C. #NUM! Error D. #NULL! Error
17. In programming, the flowchart symbol for processing symbol is……… A. rectangular.
B. diamond. C. oval. D. square.
18. Visual impairment refers to the categories of people who are not able to ………..
A. blind. B. deaf. C. dumb. D. walk.
19. When a computer program runs, a value that does not change is termed as….
A. variable. B. constant. C. expression. D. statement.
20. All the listed below are examples of sites use for sharing video except ………….
A. Facebook Live. B. Vimeo. C. YouTube. D. Instagram.
Keep reading as the 2024 BECE Computing questions continue below
21. Pi=3.14159 is an example of a constant in which programming language?
A. Java B. C++ C. Python D. Visual Basic
22. All data entry devices are…….devices. A. output B. input C. storage D. processing
23. Which type of expression is x + y, 10.75? A. relational expression. B. floating expression. C. Boolean expression. D. logical expression.
Use this image to answer questions 24 to 26
24. The image is a/an ………… A. QR code B. barcode C. line code D. number code
25. Which device is used to read the image? A. Line code reader B. QR code scanner
C. Barcode reader D. Numbers code scanner
26. The image is used to ………… A. identify location on maps. B. access email account.
C. access the web. D. identify products in stores.
27. 3+4*5// This expression when being run which operator is the considered first in order of operation precedence? A. + B. * C. // D. 3
28. The device used to feed your hand-made drawings into a computer is called……..
A. graphic tablet. B. magnetic card reader. C. optical card reader. D. QR code reader.
29. Constants are used in …….ways. A. 1 B. 2 C. 3 D. 4
30. Sitting in front of a computer for long hours with no physical activity is a major contributing factor to A. cancer. B. diabetes. C. obesity. D. fever.
31. Print “Hello, world” is an example of…. A. variable. B. constant. C. expression.
D. statement.
Download full question from this link here. Get more questions from the links at the bottom of this article.
2024 BECE Career Technology Mock 2
2024 BECE English Language Mock 2
2024 BECE Social Studies Mock 2
SOCIAL MEDIA GROUPS
Don’t forget to join our social media groups and get interactive with us. Click on red bell icon to receive notifications on all our new contents. Send questions to us via the WhatsApp number – (+233) 501121754