Best Brain Feb 2026 Computing

Best Brain Feb 2026 Computing - Computing Objective Instructions

Answer all the questions

Question 1

In an Excel spreadsheet, column A contains the names of students, and column B is the grades (A, B, C, etc.). Which formula would count the number of students who scored an A?

Question 2

Mixed Reality is a technology that

Question 3

Pressing individual key + R opens the

Question 4

A conceptual framework used to understand and implement network protocols in seven distinct layers is termed as

Question 5

The OSI model layer associated with HTTP is the

Question 6

An assignment statement is a line of code that is used to

Question 7

A machine, programmable by a computer and capable of carrying out complex tasks automatically is called a

Question 8

Best Brain Konsortium wants exclusive ownership over its exam questions and to prevent unauthorized reproduction. The company reserves this right under the

Question 9

The image above is a

Question 10

What device is capable of reading the data in the above image?

Question 11

Patterns in large datasets are recognized with the use of

Question 12

Which feature in Microsoft Word allows the user to locate a text in a document?

Question 13

Which of the following is not a standard Optical Disc?

Question 14

The keyboard shortcut used to switch between running apps in Windows 10 is

Question 15

When machines become smart and are able to solve a task intelligently like humans, it is termed

Question 16

A node in a computer network is called

Question 17

Artificial Intelligence algorithms are used in autonomous vehicles to

Question 18

The step-by-step approach used in solving specific problem is

Question 19

Convert 15 into binary.

Question 20

The robotic component that allows the robot to interact with its environment such as movement and manipulation are

Question 21

In querying an expert system, IF- THEN control structure

Question 22

Which of the following is not among the 7 - layers of the OSI model?

Question 23

The feature in a word processing application that allows you to copy and apply formatting to text within the document is called

Question 24

Ensuring that only authorized people are allowed access to confidential data is

Question 25

Which of the following is not a programming language?

Question 26

In a spreadsheet a group of adjacent cells, often containing similar data is called a

Question 27

One disadvantage associated with cloud computing is

Question 28

The barcode scanner is convenient in the supermarket to help salespersons in

Question 29

The purpose of using a firewall in a computer network is to

Question 30

Which memory stores the BIOS settings in a computer?

Question 31

Finding and correcting errors in a software code is

Question 32

The diagram below is an illustration of a

Question 33

Which device is typically used by delivery personnel to confirm deliveries?

Question 34

Which of the following is commonly used for transactions in cryptocurrency?

Question 35

Computers are classified into different generations based on

Question 36

Layer 1 of the OSI model can be associated with

Question 37

What is the benefit of using an IDE for software development?

Question 38

The shortcut Ctrl + /- is used to

Question 39

Which of the following is not a benefit of e-commerce?

Question 40

In computing, the number 192.168.1.1 is

Question 41

A diagram shows this process: Connect external drive → Select file to back up → Paste files onto external drive. Identify the process illustrated in the diagram.

Essay Question

Login to view sample answer.

Question 42

A diagram shows this process: Connect external drive → Select file to back up → Paste files onto external drive. Which MS Word graphic tool is most suitable for representing this process?

Essay Question

Login to view sample answer.

Question 43

A diagram shows this process: Connect external drive → Select file to back up → Paste files onto external drive. Explain why the MS Word graphic tool used for this process is recommended.

Essay Question

Login to view sample answer.

Question 44

A diagram shows this process: Connect external drive → Select file to back up → Paste files onto external drive. Write the steps for creating this process in MS Word using the most suitable graphic tool.

Essay Question

Login to view sample answer.

Question 45

Study the code extract shown. What command is the code written to execute?

Essay Question

Login to view sample answer.

Question 46

Study the code extract shown. Name three programs that can successfully read the code.

Essay Question

Login to view sample answer.

Question 47

Draw the standard flowchart symbol used for a decision.

Essay Question

Login to view sample answer.

Question 48

Draw the standard flowchart symbol used for a process.

Essay Question

Login to view sample answer.

Question 49

Draw the standard flowchart symbol used for input/output.

Essay Question

Login to view sample answer.

Question 50

Draw the standard flowchart symbols for the following in computer programming.

Essay Question

Login to view sample answer.

Question 51

State two differences between strong AI and weak AI.

Essay Question

Login to view sample answer.

Question 52

Complete the MS PowerPoint shape-formatting table by matching each tool to its correct function from this list: Arrange, Outline Color, Shape Fill, Rotate, Text Alignment, Group Shapes.

Essay Question

Login to view sample answer.

Question 53

Explain the difference between network topology and network attached storage.

Essay Question

Login to view sample answer.

Question 54

Distinguish between a peer-to-peer network and a client-server network.

Essay Question

Login to view sample answer.

Question 55

Give three reasons for setting up computer networks.

Essay Question

Login to view sample answer.

Question 56

A spreadsheet shows experiment data. Write a formula for cell D8 to find the average volume change using the SUM function.

Essay Question

Login to view sample answer.

Question 57

A spreadsheet shows experiment data. Write a formula for cell D8 to find the average volume change using the AVERAGE function.

Essay Question

Login to view sample answer.

Question 58

Outline three features of flash memory storage systems.

Essay Question

Login to view sample answer.

Question 59

State the use of the Insert ribbon in Microsoft PowerPoint.

Essay Question

Login to view sample answer.

Question 60

List four elements that can be added to a slide using the Insert ribbon in Microsoft PowerPoint.

Essay Question

Login to view sample answer.

Question 61

Name the labelled parts of this web address:

Essay Question

Login to view sample answer.

Question 62

Counters are widely used in automated systems to keep track of the number of available resources or to ensure that certain conditions are met. State four applications of counters in automated systems.

Essay Question

Login to view sample answer.

Question 63

What are virtual learning environments?

Essay Question

Login to view sample answer.

Question 64

Name four open learning sites usually used in virtual learning environments.

Essay Question

Login to view sample answer.

Question 65

State three ways of caring for optical discs.

Essay Question

Login to view sample answer.

Question 66

Explain the difference between text editing and text formatting.

Essay Question

Login to view sample answer.

Question 67

Classify the following tools under text editing or text formatting: Sort, Thesaurus, Spellchecker, Indent, Bullet, Align.

Essay Question

Login to view sample answer.

Question 68

Describe the operation of splitting a cell in an MS Word table.

Essay Question

Login to view sample answer.

Question 69

Describe the operation of merging a cell in an MS Word table.

Essay Question

Login to view sample answer.

Question 70

Describe the operation of shading a cell in an MS Word table.

Essay Question

Login to view sample answer.

Question 71

Describe the operation of applying a border in an MS Word table.

Essay Question

Login to view sample answer.

Question 72

What is data breach?

Essay Question

Login to view sample answer.

Question 73

List two examples of non-physical data threats.

Essay Question

Login to view sample answer.

Question 74

Explain the contextual tab in Microsoft PowerPoint.

Essay Question

Login to view sample answer.

Question 75

List four contextual tabs available in Microsoft PowerPoint.

Essay Question

Login to view sample answer.

Question 76

Write the steps used to adjust the system time on a Windows 10 computer.

Essay Question

Login to view sample answer.

Question 77

State two differences between an algorithm and a programming language.

Essay Question

Login to view sample answer.

Question 78

Write the following acronyms in full: ANN, RFID, WLAN, PAN.

Essay Question

Login to view sample answer.