Data Processing Question
Data Processing Question
1. ……….is a basic fact that needs to undergo processing. A. information B. data C. output D. input
2. The methodology of converting data into information is A. data and information B. data processing C.
decision making D. none of the above
3. The major reason for data processing is A. decision making B. conflict promotion C. information
generation D. data manipulation
4. In data processing, input activity involves A. collection B. verification C. retrieving D. all of the
above.
7. Jacquard’s loom was used in the ……A. mechanical industry B. weaving industry C. food industry D.
all of the above
8. ……. was the first calculating device. A. Napier’s Bones B. Punched card C. Abacus D. Slide rule
12. Which of the generation of computer was between 1975 and 1982? A. First B. Second C. Fifth D.
Fourth
13. Which of the generation of computer used vacuum tube? A. First B. Second C. Fifth D. Fourth
14. Which of the generation of computers used VLSIC? A. First B. Second C. Fifth D. Fourth
15. Which of the generation of computers began Non Procedural programming? A. First B. Second C.
Fifth D. Fourth
17. The generation of computer that uses AI is A. third B. second C. fifth D. first
18. ……..is the smallest and the most popular class of computers. A. Micro B. Mini C. Super D.
Mainframe.
19. What type of computer combines both features of digital and Analogue computers? A. micro B.
hybrid C. digital D. super
20. Computers designed solely to solve a restricted class of problem is called A. general purpose B.
special purpose C. digital D. analogue
21. The ancient man began counting by using ……A. fingers B. slide rule C. abacus D. none
22. The following are examples of early counting methods except ……A. calculator B. pebbles C.
grains D. none
23. In using fingers and toes, you can only count up to …….A. 20 B. 40 C. 50 D. 100
24. The following can be used for counting in the ancient times except…..A. fingers B. computer C.
stones D. none
25. The stages of development of the computer machine are known as……..A. computer age B.
computer history C. computer generation D. all options
26. The following are disadvantages of ICT except A. fraud B. virus C. faster communication D. none
27. ICT has turned the whole world into a ……A. global village B. galaxy C. universe D. none
28. The production of goods with or without human intervention using computer is known as …….A.
automation B. AI C. expert system D. vacuum tube
29. E-commerce stands for ……..A. electric commerce B. electronic commerce C. electrical commerce.
D. none
30. ATM means ……. A. Automatic Teller Machine B. Automated Teller Machine C. Auto Teller
Machine D. None of the options
Theory
1. What is the difference between general purpose computers and special purpose computers?
1. In the approach of data modeling ____ data modeling illustrate the specific entities, attribute and
relationship involved in business function.(A)Conceptual Data Modeling (b) Logical Data Modeling (c)
Flat data Modeling (d)Physical Data Modeling
2. The processing of structuring and organizing data is referred to as ______ (a)Data Structure (b) Data
Organization (c) Data Manipulation (d) Data Modeling
3. The major concept for data modeling is to ________________ (a) Translate simple system design to
complex representation of data (b) Translate complex system design to simple representation of data (c)
Translate simple system design to simple representation of data (d) Translate complex system design to
complex representation of data
4. The term “Data Model” refers to two different things- data organization and ________ (a) Data Model
(b) Data Processing (c) Data Structure (d) Data Organization
5. The following are unstructured data except (a) Video (b) email message (c) Picture (d)
Database
6. In the approach of data modeling ____ data modeling identifies the highest level relationship
between different entities (A)Conceptual Data Modeling(B) Logical Data Modeling (C) Flat data Modeling
(D) Physical Data Modeling
7. ____ model organizes data using two fundamental construct called record and set. (A) Network (b)
Relational (c) Object Oriented (d) Star Schema
8. ____model consists of a single, two-dimensional array of data elements (A) Network (b) Relational
(c) Object Oriented (d) Star Schema
9. ____database model is organized into an upside-down tree-like structure (A) Network (b) Relational
(c) Object Oriented (d) Hierarchical
10. Another name for field type is known as ____ (a) File type (b) Name type (c) Record type (d) Data
type
11. Another name for unique identifier is known as ____ (a) Key (b) Data (c) Field (d) Record
12. ____ is an attribute or field that can be used to identify a record in a database table or file. (a) Data
(b) Field (c) Key (d) Table
13. ____ is used to design a database in a computer. (a) Database package (b) Graphics package (c)
Spreadsheet package (d) Word Processing package
14. ____model organizes data using two fundamental constructs, called records and sets.(a) Hierarchical
(b) Relational (c) Network (d) Optical
15. Standard Data model can also be called ____ (A)Manufacture Standard Data Model
(B)Industry Standard Data Model (C)Structured Standard Data Mode (D)Enhanced Standard Data
Model
16. ____ are great communication tool because it allows interaction and communication between
designers, programmers and end users (a)Data Model (b) Normal Form (c) Database (d)
Attribute
17. What is the full meaning of ISDM? (A)Industry Significant Data Model (B)International
Standard Data Model (C)International Significant Data Model (D)Industry Standard Data Model
18. ____ is the international defense enterprise architecture specification for exchange group. (a) Ideas
Group (b) Standard Group (c) Best Group (d) Normal Group
19. The following are significance of data model except __________ (a)It can foster improved
understanding of the organization for which the database design is developed (b)It also imposes
constraints or limitations on the data placed within the structure (c)It helps in structuring and organizing
data (d)It creates database management system for organization
20. ____ normal form says that all column values must be atomic (a) 1NF (b) 2NF (c) 3NF (d)4NF
Theory
Ss3
1. Data models describe ……… data for storage in data management systems (a) structured (b)
unstructured (c) integer (d) alphabetic
2. Which of this is not an example of standard data model (a) ISO 10303 (b) ISO 15926 (c) IDEAS
GROUP d) Good shepherd
3. ……….. key is a field in a relational table that matches a primary key of another table (a) foreign (b)
surrogate (c) primary (d) candidate
4. ……………. is graphical representation of entities and their relationships to each other (a) Entity-
Relationship Diagram (b) Entity-Relationship Picture (c) Entity-Relationship Data (d) Entity-Relationship
Symbol
5. A roof covers a building describes …………relationship (a) one-to-one (b) one-to-many (c) many-to-
many(d) none of the above
6. ………. is a database table that has been reduced to certain fields.a) Table b) An index c) Table model
d) Network model
8. The …………index can take place only if the data records are sorted on the search key field.
a)unclustered b)insert c) update d) clustered
9. A …………….. can contain several unclusterd indexes a) data file b) primary c) check d) index
10. Index contain a value and ……. a)pointer b) sign c) update d) model
11. ………. is an index in which the search key contains some candidate key. a) Unique index b) An index
c) composite d) sparse index
12. …… can be created on a non- key attribute. a) primary index b) dense index c) secondary index d)
sparse index
13. A sparse index contains one entry for each ……of records in the data file. a) page b) table c) row d)
column
14. ………is the one in which not all fields in the Search key are bound to constant. a) dense index b)
composite search key c) secondary index d) range query
15. ……. is when the search key for an index contain several fields. a) primary index b) composite search
key c) secondary index d) unique index
16. Maintenance is necessary on computer to avoid ………. a) hardware failure b) stealing c) invasion d)
crime
17. Excess heat accelerates the deterioration of the delicate ……… in the system. a) vacuum b) transistors
c) circuits d) particles
18. Dust and dirt are the most common cause of ……… a) leakage b) overheating c) breakage d) spooling.
19. ……….. is used to remove dust, dirt and hair from the keyboard. a) Vacuum cleaner b) Brush c) Old
rag d) Paper towels
20. It is advisable to wear an ………… to reduce transferring static electricity from your body to the
computer. a) hand glove b) anti – static wrist strip c) coat d) dust cover
21. Which of the following is not a software maintenance? a) Virus b) Spyware c) Hard disk d) Registry
removal
22. The software maintenance that involves developing and deploying solutions to problems is .……… a)
corrective b) adaptive c) preventive d) perfective
23. The software maintenance that takes care of the changes that occur in software maintenance is
called ……... a) adaptive b) corrective c) perfective d) preventive
24. Disk cleaning should be done ……….. a) hourly b) daily c) weekly d) yearly
25. Patches and update are regularly released by software companies to tackle security problems found
in …………. a) programs b) hardware c) people ware d) peripheral
26. …………….is the practice of keeping data protected from corruption and unauthorized access. (a) Data
measurement (b) Data security (c) Data protection (d) Data control
27. Which of these is not a type of security control ……?(a) access control (b) auditing (c) encryption(d)
storage
28. .………….. security mechanism uses mathematical schemes and algorithm to scramble data into
unreadable text. (a) Encryption (b) Auditing (c) Authentication (d) Auditing
29. .…………. is the process of copying and archiving data so it may be used to restore original after a data
loss (a) Backup (b) Restore (c) Control (d) Saving
30. …..……… is the computer professional responsible for the configuration, administration and
maintenance of a database (a) Programmer (b) System administrator (c) Database administrator (d)
System analyst
Theory
2. Explain the following terms in crash recovery (i) Media recovery (ii) Check point (iii) The Write - Ahead
log protocol