0% found this document useful (0 votes)
22 views1 page

ss2 Mid Test Questions

This document outlines questions for a data processing midterm test. It covers topics such as file organization, defining SQL, creating databases and tables in SQL, adding constraints, and internet topics like the definition of internet, examples of web browsers, advantages and abuses of the internet, and explanations of malicious software, denial of service attacks, SQL injection, and phishing. The document provides detailed questions to test understanding of these concepts.

Uploaded by

okwuonujohn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views1 page

ss2 Mid Test Questions

This document outlines questions for a data processing midterm test. It covers topics such as file organization, defining SQL, creating databases and tables in SQL, adding constraints, and internet topics like the definition of internet, examples of web browsers, advantages and abuses of the internet, and explanations of malicious software, denial of service attacks, SQL injection, and phishing. The document provides detailed questions to test understanding of these concepts.

Uploaded by

okwuonujohn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

 FILE ORGANIZATION

1. Define file organization


DATA PROCESSING MIDTERM TEST
2. List four types of file organization
CREATING AND MODIFYING RELATION USING SQL
3. Outline five factors to be considered before choosing a file
QUESTIONS. organization
1. Explain SQL
 INTERNET
2. What is constraints?
1. Define internet
3. List six data types
2. List 4 example of web browser
4. CREATE A DATABASE LET THE NAME BE ; ssonedatabase and
3. List some common features of web browser
create a table with the following field;
4. List 6 advantages of internet
Firstname, last name, address, phone no,dofb, gender,Id
5. List 7 abuses of internet
Create a primary key with the Id, and insert a constraint that will
6. Explain the following
check the gender to be only female. Each field must not be empty
1. Malicious software
in the table.
2. Denial of service attack
Populate your table. From the table created update a record of
3. SQL injection
your choice.
4. Phishing

1 2

FILE ORGANIZATION
1. Define file organization
DATA PROCESSING MIDTERM TEST 2. List four types of file organization
CREATING AND MODIFYING RELATION USING SQL 3. Outline five factors to be considered before choosing a file
QUESTIONS. organization
1. Explain SQL INTERNET
2. What is constraints? 1. Define internet
3. List six data types 2. List 4 example of web browser
4. CREATE A DATABASE LET THE NAME BE ; ssonedatabase and 3. List some common features of web browser
create a table with the following field; 4. List 6 advantages of internet
Firstname, last name, address, phone no,dofb, gender,Id 5. List 7 abuses of internet
Create a primary key with the Id, and insert a constraint that will 6. Explain the following
check the gender to be only female. Each field must not be empty a) Malicious software
in the table. b) Denial of service attack
Populate your table. From the table created update a record of c) SQL injection
your choice. d) Phishing
2
1

FILE ORGANIZATION
1.
Define file organization
DATA PROCESSING MIDTERM TEST 2.
List four types of file organization
CREATING AND MODIFYING RELATION USING SQL 3.
Outline five factors to be considered before choosing a file
QUESTIONS. organization
1. Explain SQL INTERNET
2. What is constraints? 1. Define internet
3. List six data types 2. List 4 example of web browser
4. CREATE A DATABASE LET THE NAME BE ; ssonedatabase and 3. List some common features of web browser
create a table with the following field; 4. List 6 advantages of internet
Firstname, last name, address, phone no,dofb, gender,Id 5. List 7 abuses of internet
Create a primary key with the Id, and insert a constraint that will 6. Explain the following
check the gender to be only female. Each field must not be empty a. Malicious software
in the table. b. Denial of service attack
Populate your table. From the table created update a record of c. SQL injection
your choice. d. Phishing 2
1
 FILE ORGANIZATION
1. Define file organization
DATA PROCESSING MIDTERM TEST 2. List four types of file organization
CREATING AND MODIFYING RELATION USING SQL 3. Outline five factors to be considered before choosing a file
QUESTIONS. organization
1. Explain SQL INTERNET
2. What is constraints? 1. Define internet
3. List six data types 2. List 4 example of web browser
4. CREATE A DATABASE LET THE NAME BE ; ssonedatabase and 3. List some common features of web browser
create a table with the following field; 4. List 6 advantages of internet
Firstname, last name, address, phone no,dofb, gender,Id 5. List 7 abuses of internet
Create a primary key with the Id, and insert a constraint that will 6 Explain the following
check the gender to be only female. Each field must not be empty a. Malicious software
in the table. b. Denial of service attack
Populate your table. From the table created update a record of c. SQL injection
your choice. d. Phishing
2
1

You might also like