Quiz-summary
0 of 40 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You have to pass the previous Module’s quiz in order to start this quiz
Results
Results
0 of 40 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- BECE 2012 ICT past questions 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- Answered
- Review
-
Question 1 of 40
1. Question
Category: BECE 2012 ICT past questionsThe device that converts computer output into displayed images is the ………………………..
CorrectIncorrect -
Question 2 of 40
2. Question
Category: BECE 2012 ICT past questionsThe least number of input devices that a computer system can have is ………………………
CorrectIncorrect -
Question 3 of 40
3. Question
Category: BECE 2012 ICT past questionsThe device used to ensure a constant flow of power supply to a computer system is the ……………………………
CorrectIncorrect -
Question 4 of 40
4. Question
Category: BECE 2012 ICT past questionsWhich of the following devices has the largest storage capacity?
CorrectIncorrect -
Question 5 of 40
5. Question
Category: BECE 2012 ICT past questionsThe total number of command buttons on the title bar of an opened Word processing window is ……………………..
CorrectIncorrect -
Question 6 of 40
6. Question
Category: BECE 2012 ICT past questionsProcessed or transformed facts which are meaningful to the user is called ……………………….
CorrectIncorrect -
Question 7 of 40
7. Question
Category: BECE 2012 ICT past questionsThe following are possible health hazards of prolonged use of the computer system except …………………………
CorrectIncorrect -
Question 8 of 40
8. Question
Category: BECE 2012 ICT past questionsWhich key on the keyboard is used to erase characters from right to left in a word processing application.
CorrectIncorrect -
Question 9 of 40
9. Question
Category: BECE 2012 ICT past questionsThe key on the QWERTY keyboard used to produce alphabetical upper case letters is ……………………….
CorrectIncorrect -
Question 10 of 40
10. Question
Category: BECE 2012 ICT past questionsGiven sizes and designs of letters, numbers and symbols that are displayed in a word processing document are referred to as ………………..
CorrectIncorrect -
Question 11 of 40
11. Question
Category: BECE 2012 ICT past questionsWhich of the following is a tool on the drawing tool bar of a word processing program?
CorrectIncorrect -
Question 12 of 40
12. Question
Category: BECE 2012 ICT past questionsWhen an image is copied, it first goes to the …………………………….
CorrectIncorrect -
Question 13 of 40
13. Question
Category: BECE 2012 ICT past questionsTo press the letter J, which finger is appropriate to use on a QWERTY keyboard?
CorrectIncorrect -
Question 14 of 40
14. Question
Category: BECE 2012 ICT past questionsThe Internet is a ………………………………………….
CorrectIncorrect -
Question 15 of 40
15. Question
Category: BECE 2012 ICT past questionsThe computer equivalence of a sheet of paper divided into rows and columns in the Microsoft Office Suite is called …………………………………
CorrectIncorrect -
Question 16 of 40
16. Question
Category: BECE 2012 ICT past questionsThe temporary working memory of a computer system is the …………………………….
CorrectIncorrect -
Question 17 of 40
17. Question
Category: BECE 2012 ICT past questionsThe software responsible for the management of the basic operations of the computer is the …………………………..
CorrectIncorrect -
Question 18 of 40
18. Question
Category: BECE 2012 ICT past questionsOn the desktop, the part which displays opened applications and other icons is referred to as ……………………………….
CorrectIncorrect -
Question 19 of 40
19. Question
Category: BECE 2012 ICT past questionsThe act of pressing a computer mouse button twice quickly without moving the mouse is termed …………………..
CorrectIncorrect -
Question 20 of 40
20. Question
Category: BECE 2012 ICT past questionsThe following are good practices in the computing environment except ………………………………..
CorrectIncorrect -
Question 21 of 40
21. Question
Category: BECE 2012 ICT past questionsWhich of the following software can be used to enhance teaching and learning through the use of pictures, video and sound?
CorrectIncorrect -
Question 22 of 40
22. Question
Category: BECE 2012 ICT past questionsThe total number of keys on a standard QWERTY keyboard is ………………………….
CorrectIncorrect -
Question 23 of 40
23. Question
Category: BECE 2012 ICT past questionsWhich of the following is valid folder name?
CorrectIncorrect -
Question 24 of 40
24. Question
Category: BECE 2012 ICT past questionsA program on the computer which enables users to type letters to friends is the …………………………….
CorrectIncorrect -
Question 25 of 40
25. Question
Category: BECE 2012 ICT past questionsThe command that enables the user to save a previously saved document under a new name is ………………………
CorrectIncorrect -
Question 26 of 40
26. Question
Category: BECE 2012 ICT past questionsThe standard tool bar contains the buttons that …………………………….
CorrectIncorrect -
Question 27 of 40
27. Question
Category: BECE 2012 ICT past questionsTo see exactly how the pages of a current document will appear when printed, the command given is the ……………………
CorrectIncorrect -
Question 28 of 40
28. Question
Category: BECE 2012 ICT past questionsA tool for locating information on the Internet is the ……………………………..
CorrectIncorrect -
Question 29 of 40
29. Question
Category: BECE 2012 ICT past questionsAn entity in a file system which contains a group of files is called ………………………
CorrectIncorrect -
Question 30 of 40
30. Question
Category: BECE 2012 ICT past questionsThe creation of a copy of a data on a computer system for safe-keeping externally is called …………………….
CorrectIncorrect -
Question 31 of 40
31. Question
Category: BECE 2012 ICT past questionsThe letter that normally represents the floppy disk in an operating system is …………………………..
CorrectIncorrect -
Question 32 of 40
32. Question
Category: BECE 2012 ICT past questionsRecycle bin or trash bin contains deleted files and folders from the ………………………..
CorrectIncorrect -
Question 33 of 40
33. Question
Category: BECE 2012 ICT past questionsKeys on a computer keyboard which are used to move the cursor in a specified direction are called …………………..
CorrectIncorrect -
Question 34 of 40
34. Question
Category: BECE 2012 ICT past questionsTo underline a selected text in a word processing program, the keys used are ………………………..
CorrectIncorrect -
Question 35 of 40
35. Question
Category: BECE 2012 ICT past questionsDouble-clicking on a word in a word processing program selects the ……………………….
CorrectIncorrect -
Question 36 of 40
36. Question
Category: BECE 2012 ICT past questionsAll the following are reasons for using ICT in education except …………………………….
CorrectIncorrect -
Question 37 of 40
37. Question
Category: BECE 2012 ICT past questionsIn a word processing program, lines, blocks, arrows and flowcharts are found on which of the following tool bars?
CorrectIncorrect -
Question 38 of 40
38. Question
Category: BECE 2012 ICT past questionsWhich program icon on the Desktop leads to the disk drives?
CorrectIncorrect -
Question 39 of 40
39. Question
Category: BECE 2012 ICT past questionsWhich of the following terms refers to unsolicited emails in the form of advertising or chain letters?
CorrectIncorrect -
Question 40 of 40
40. Question
Category: BECE 2012 ICT past questionsComputer virus is capable of ……………………………….
CorrectIncorrect