0% found this document useful (0 votes)
17 views3 pages

Data Processing SSS 2 2nd Term Q

The document is an examination paper for SSS 2 students at In God We Trust (Peniel) Schools, focusing on Data Processing. It consists of multiple-choice questions covering various topics such as data models, relational databases, computer peripherals, and internet safety practices, followed by a theory section requiring written responses on specific terms and concepts. The exam is structured to assess both objective knowledge and theoretical understanding in data processing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views3 pages

Data Processing SSS 2 2nd Term Q

The document is an examination paper for SSS 2 students at In God We Trust (Peniel) Schools, focusing on Data Processing. It consists of multiple-choice questions covering various topics such as data models, relational databases, computer peripherals, and internet safety practices, followed by a theory section requiring written responses on specific terms and concepts. The exam is structured to assess both objective knowledge and theoretical understanding in data processing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

IN GOD WE TRUST (PENIEL) SCHOOLS

SECOND TERM EXAMINATION


SUBJECT: DATA PROCESSING CLASS: SSS 2
SECTION A: OBJECTIVES DURATION: 30 MINUTES
1. ___________Is an entity in the entity-relationship model? (a) A single occurrence of a table (b) A column
in a database table (c) A logical grouping of related data (d) A type of relationship between tables
2. ___________refers to a single occurrence of an entity? (a) Entity instance (b) Entity set (c) Attribute (d)
Relationship
3. The cardinality of a relationship indicates ? (a) The number of entities that can be involved in the
relationship (b) The data type of the relationship attribute (c) The primary key of the relationship (d) The
degree of the relationship
4. In the relational model, is a relation? (a) A connection between two tables (b) A logical grouping of related
data (c) A single occurrence of a database table (d) A type of attribute
5. The data model that describes how to organize data using a database management system is (a) data
structure (b) data organization (c) data modelling (d) data model
6. ___________summaries and organizes data for viewing online and printing (a) forms (b) query (c) report
(d) table
7. The data type that stores up to 64000 is (a) text (b) auto-number (c) memo (d) number
8. _______________consists of a single, two dimensional array of data elements where all members of given
columns are assumed to have identical values and all members of the rows are assumed to be related to
one another. (a) relational model (b) flat (c) hierarchical (d) network
9. Which of the following is not a type of networking topology (a) Bus (b) Local (c) mesh (d) ring (e) star
10. Convert 11011, to base 10 (a) 17 (b) 27 (c) 31 (d) 37 € 41
11. The first stage of data processing is called (a) data analysis (b) data retrieval (c) data collection (d) data
summarization
12. Which of these is not among the categories of application specific software (a) accounting software (c)
database software (c) payroll programs (d) statistical packages (e) web design software
13. Which of the following is not a method of data collection (a) parsing (b) observation (c) interview (d)
questionnaire
14. How can you modify a relation using SQL? (a) Using the MODIFY statement (b) Using the UPDATE
statement (c) Using the ALTER TABLE statement (d) Using the DELETE statement
15. ______________ Is the purpose of the booting process in computing? (a) To shut down the computer (b)
To restart the computer (c) To load the operating system into memory (d) To install new software updates
16. What are the types of relational keys commonly used in databases? (a) Primary, foreign, and alternate (b)
Integer, float, and string (c) Sequential, random, and indexed (d) Ascending, descending, and random
17. What is the primary function of a web browser? (a) To access and view websites on the internet (b) To
create and edit documents (c) To store and manage files on a computer (d) To send and receive emails
18. How do search engines help users find information online? (a) By indexing and organizing web pages (b)
By blocking access to certain websites (c) By providing free online games (d) By selling products and
services
19. What are some common internet safety practices? (a) Using strong and unique passwords (b) Sharing
personal information online (c) Clicking on suspicious links or pop-ups (d) Downloading files from
unknown sources
20. ____________Is an example of a system software? (a) Operating system (b) Word processor (c)
Spreadsheet software (d) Presentation software
21. File organization method arranges records in sequential order based on a key field? (a) Sequential (b)
Random (c) Indexed (d) Hashed
22. What is the purpose of the operating system in a computer? (a) To manage hardware resources and provide
user interfaces (b) To create and edit documents (c) To play games and watch videos (d) To browse the
internet and send emails
23. What is the main function of a printer as a computer peripheral? (a) To produce hard copies of digital
documents (b) To scan and digitize physical documents (c) To input data into the computer (d) To store
and retrieve data from memory
24. What is the role of a mouse in computer usage? (a) To navigate and interact with graphical user interfaces
(b) To type and input text into the computer (c) To display visual output on a monitor (d) To provide audio
output through speakers
25. What is the primary purpose of the keyboard as an input device? (a) To enter text and commands into the
computer (b) To display images and videos (c) To manipulate and edit digital documents (d) To connect
to the internet and browse websites
26. Which of these is an example of application software used for creating presentations? (a) Microsoft
PowerPoint (b) Microsoft Excel (c) Adobe Photoshop (d) Windows Media Player
27. How does a monitor function as a computer peripheral? (a) To display visual output from the computer
(b) To store and retrieve data from memory (c) To scan and digitize physical documents (d) To produce
hard copies of digital documents
28. What are some common types of relational keys used in database management? (a) Primary, foreign, and
alternate (b) Sequential, random, and indexed (c) Ascending, descending, and random (d) Integer, float,
and string
29. What is the significance of a primary key in a database table? (a) It uniquely identifies each record in the
table (b) It establishes relationships between tables (c) It sorts records in the table (d) It adds new records
to the table
30. What is the purpose of the ALTER TABLE statement in SQL? (a) To modify the structure of an existing
table (b) To insert new records into a table (c) To delete records from a table (d) To update existing records
in a table
31. How does the internet benefit users? (a) By providing access to a vast amount of information and resources
(b) By restricting access to certain websites (c) By encouraging unhealthy online behaviors (d) By slowing
down computer performance
32. What constitutes an abuse of the internet? (a) Cyberbullying and online harassment (b) Responsible online
behavior (c) Sharing knowledge and collaborating online (d) Following internet safety guidelines
33. What is the function of a web browser in internet usage? (a) To access and view websites on the internet
(b) To manage hardware resources and provide user interfaces (c) To create and edit digital documents (d)
To play games and watch videos
34. What are some common internet safety practices? (a) Using strong and unique passwords (b) Sharing
personal information online (c) Clicking on suspicious links or pop-ups (d) Downloading files from
unknown sources
35. ____________Is an example of an application software used for creating spreadsheets? (a) Microsoft
Excel (b) Microsoft Word (c) Adobe Photoshop (d) Windows Media Player
36. What is the primary role of a printer as a computer peripheral? (a) To produce hard copies of digital
documents (b) To scan and digitize physical documents (c) To input data into the computer (d) To store
and retrieve data from memory
37. What is the primary purpose of the keyboard as an input device? (a) To enter text and commands into the
computer (b) To display images and videos (c) To manipulate and edit digital documents (d) To connect
to the internet and browse websites
38. What is an example of an application software used for creating presentations? (a) Microsoft PowerPoint
(b) Microsoft Excel (c) Adobe Photoshop (d) Windows Media Player
39. How does a monitor function as a computer peripheral? (a) To display visual output from the computer
(b) To store and retrieve data from memory (c) To scan and digitize physical documents (d) To produce
hard copies of digital documents
40. _____________ is the significance of a primary key in a database table? (a) It uniquely identifies each
record in the table (b) It establishes relationships between tables (c) It sorts records in the table (d) It adds
new records to the table

THEORY
INSTRUCTIONS: Answer any five questions. DURATION: 1 HOUR 30 MINUTES
1. Write a short on each of the following terms:
 Bus
 Address
 Register
 Data
 Primary key
2. Define the following terms:
 Computer files
 Record
 Field
 Foreign keys
 Entity
3. What is file organisation?
Mention and explain types of file organisation.
4. What is a Data model?
Draw a sample of file structure.
5. State the criteria for classifying computer files.
Write out 5 basic operations that can be performed on computer files
6. What is computer file insecurity?
What are the factors to consider when choosing a file organisation method?

You might also like