0% found this document useful (0 votes)
21 views

Data Processing Question

The document contains a series of multiple-choice questions and theory prompts related to data processing, computer generations, data modeling, database structures, and computer maintenance. It covers topics such as the differences between general and special purpose computers, data models, and the significance of data security. Additionally, it includes theory questions that require explanations of concepts like crash recovery and the duties of a database administrator.

Uploaded by

fawolegbotemi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Data Processing Question

The document contains a series of multiple-choice questions and theory prompts related to data processing, computer generations, data modeling, database structures, and computer maintenance. It covers topics such as the differences between general and special purpose computers, data models, and the significance of data security. Additionally, it includes theory questions that require explanations of concepts like crash recovery and the duties of a database administrator.

Uploaded by

fawolegbotemi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

ss1

1. ……….is a basic fact that needs to undergo processing. A. information B. data C. output D. input

2. The methodology of converting data into information is A. data and information B. data processing C.
decision making D. none of the above

3. The major reason for data processing is A. decision making B. conflict promotion C. information
generation D. data manipulation

4. In data processing, input activity involves A. collection B. verification C. retrieving D. all of the
above.

5. One of these is not a property of data. A. presentation B. collection C. misuse D. accuracy

6. Napier’s Bones had ……..A. 9 rods B. 11 rods C. 10 rods D. 12 rods

7. Jacquard’s loom was used in the ……A. mechanical industry B. weaving industry C. food industry D.
all of the above

8. ……. was the first calculating device. A. Napier’s Bones B. Punched card C. Abacus D. Slide rule

9. The octal number system has a radix of ……. A. 7 B. 10 C. 16 D. 8

10. The Decimal Number is in Base ……A. 2 B. 8 C. 10 D. 16

11. AI means………….A. artefact intelligence B. artificial intellect C. artificial intelligence D. attitude


intelligence.

12. Which of the generation of computer was between 1975 and 1982? A. First B. Second C. Fifth D.
Fourth

13. Which of the generation of computer used vacuum tube? A. First B. Second C. Fifth D. Fourth

14. Which of the generation of computers used VLSIC? A. First B. Second C. Fifth D. Fourth

15. Which of the generation of computers began Non Procedural programming? A. First B. Second C.
Fifth D. Fourth

16. How many classifications of computers do we have? A. 2 B. 4 C. 7 D. 3

17. The generation of computer that uses AI is A. third B. second C. fifth D. first

18. ……..is the smallest and the most popular class of computers. A. Micro B. Mini C. Super D.
Mainframe.

19. What type of computer combines both features of digital and Analogue computers? A. micro B.
hybrid C. digital D. super
20. Computers designed solely to solve a restricted class of problem is called A. general purpose B.
special purpose C. digital D. analogue

21. The ancient man began counting by using ……A. fingers B. slide rule C. abacus D. none

22. The following are examples of early counting methods except ……A. calculator B. pebbles C.
grains D. none

23. In using fingers and toes, you can only count up to …….A. 20 B. 40 C. 50 D. 100

24. The following can be used for counting in the ancient times except…..A. fingers B. computer C.
stones D. none

25. The stages of development of the computer machine are known as……..A. computer age B.
computer history C. computer generation D. all options

26. The following are disadvantages of ICT except A. fraud B. virus C. faster communication D. none

27. ICT has turned the whole world into a ……A. global village B. galaxy C. universe D. none

28. The production of goods with or without human intervention using computer is known as …….A.
automation B. AI C. expert system D. vacuum tube

29. E-commerce stands for ……..A. electric commerce B. electronic commerce C. electrical commerce.
D. none

30. ATM means ……. A. Automatic Teller Machine B. Automated Teller Machine C. Auto Teller
Machine D. None of the options

Theory

1. What is the difference between general purpose computers and special purpose computers?

2. Explain the following: digital, analogue and hybrid computers.

3. Give any two examples of general purpose computer.

4. Mention classification of computer by purpose.

5. What is data processing?

6. Describe and explain a typical data processing cycle.

7. Mention the properties of data.


Ss2

1. In the approach of data modeling ____ data modeling illustrate the specific entities, attribute and
relationship involved in business function.(A)Conceptual Data Modeling (b) Logical Data Modeling (c)
Flat data Modeling (d)Physical Data Modeling

2. The processing of structuring and organizing data is referred to as ______ (a)Data Structure (b) Data
Organization (c) Data Manipulation (d) Data Modeling

3. The major concept for data modeling is to ________________ (a) Translate simple system design to
complex representation of data (b) Translate complex system design to simple representation of data (c)
Translate simple system design to simple representation of data (d) Translate complex system design to
complex representation of data

4. The term “Data Model” refers to two different things- data organization and ________ (a) Data Model
(b) Data Processing (c) Data Structure (d) Data Organization

5. The following are unstructured data except (a) Video (b) email message (c) Picture (d)
Database

6. In the approach of data modeling ____ data modeling identifies the highest level relationship
between different entities (A)Conceptual Data Modeling(B) Logical Data Modeling (C) Flat data Modeling
(D) Physical Data Modeling

7. ____ model organizes data using two fundamental construct called record and set. (A) Network (b)
Relational (c) Object Oriented (d) Star Schema

8. ____model consists of a single, two-dimensional array of data elements (A) Network (b) Relational
(c) Object Oriented (d) Star Schema

9. ____database model is organized into an upside-down tree-like structure (A) Network (b) Relational
(c) Object Oriented (d) Hierarchical

10. Another name for field type is known as ____ (a) File type (b) Name type (c) Record type (d) Data
type

11. Another name for unique identifier is known as ____ (a) Key (b) Data (c) Field (d) Record

12. ____ is an attribute or field that can be used to identify a record in a database table or file. (a) Data
(b) Field (c) Key (d) Table

13. ____ is used to design a database in a computer. (a) Database package (b) Graphics package (c)
Spreadsheet package (d) Word Processing package
14. ____model organizes data using two fundamental constructs, called records and sets.(a) Hierarchical
(b) Relational (c) Network (d) Optical

15. Standard Data model can also be called ____ (A)Manufacture Standard Data Model
(B)Industry Standard Data Model (C)Structured Standard Data Mode (D)Enhanced Standard Data
Model

16. ____ are great communication tool because it allows interaction and communication between
designers, programmers and end users (a)Data Model (b) Normal Form (c) Database (d)
Attribute

17. What is the full meaning of ISDM? (A)Industry Significant Data Model (B)International
Standard Data Model (C)International Significant Data Model (D)Industry Standard Data Model

18. ____ is the international defense enterprise architecture specification for exchange group. (a) Ideas
Group (b) Standard Group (c) Best Group (d) Normal Group

19. The following are significance of data model except __________ (a)It can foster improved
understanding of the organization for which the database design is developed (b)It also imposes
constraints or limitations on the data placed within the structure (c)It helps in structuring and organizing
data (d)It creates database management system for organization

20. ____ normal form says that all column values must be atomic (a) 1NF (b) 2NF (c) 3NF (d)4NF

Theory

1. Differentiate between Hierarchical and Network Model.

2. Explain Flat data model.

3. List and explain four types of database model

4. Define the following; Data, Field, record, File.

5. List and explain types of database Model.

Ss3

1. Data models describe ……… data for storage in data management systems (a) structured (b)
unstructured (c) integer (d) alphabetic
2. Which of this is not an example of standard data model (a) ISO 10303 (b) ISO 15926 (c) IDEAS
GROUP d) Good shepherd

3. ……….. key is a field in a relational table that matches a primary key of another table (a) foreign (b)
surrogate (c) primary (d) candidate

4. ……………. is graphical representation of entities and their relationships to each other (a) Entity-
Relationship Diagram (b) Entity-Relationship Picture (c) Entity-Relationship Data (d) Entity-Relationship
Symbol

5. A roof covers a building describes …………relationship (a) one-to-one (b) one-to-many (c) many-to-
many(d) none of the above

6. ………. is a database table that has been reduced to certain fields.a) Table b) An index c) Table model
d) Network model

7. The copy of an index is always in …… form. a) duplicate b) field c) sorted d) domain

8. The …………index can take place only if the data records are sorted on the search key field.
a)unclustered b)insert c) update d) clustered

9. A …………….. can contain several unclusterd indexes a) data file b) primary c) check d) index

10. Index contain a value and ……. a)pointer b) sign c) update d) model

11. ………. is an index in which the search key contains some candidate key. a) Unique index b) An index
c) composite d) sparse index

12. …… can be created on a non- key attribute. a) primary index b) dense index c) secondary index d)
sparse index

13. A sparse index contains one entry for each ……of records in the data file. a) page b) table c) row d)
column

14. ………is the one in which not all fields in the Search key are bound to constant. a) dense index b)
composite search key c) secondary index d) range query

15. ……. is when the search key for an index contain several fields. a) primary index b) composite search
key c) secondary index d) unique index

16. Maintenance is necessary on computer to avoid ………. a) hardware failure b) stealing c) invasion d)
crime

17. Excess heat accelerates the deterioration of the delicate ……… in the system. a) vacuum b) transistors
c) circuits d) particles

18. Dust and dirt are the most common cause of ……… a) leakage b) overheating c) breakage d) spooling.
19. ……….. is used to remove dust, dirt and hair from the keyboard. a) Vacuum cleaner b) Brush c) Old
rag d) Paper towels

20. It is advisable to wear an ………… to reduce transferring static electricity from your body to the
computer. a) hand glove b) anti – static wrist strip c) coat d) dust cover

21. Which of the following is not a software maintenance? a) Virus b) Spyware c) Hard disk d) Registry
removal

22. The software maintenance that involves developing and deploying solutions to problems is .……… a)
corrective b) adaptive c) preventive d) perfective

23. The software maintenance that takes care of the changes that occur in software maintenance is
called ……... a) adaptive b) corrective c) perfective d) preventive

24. Disk cleaning should be done ……….. a) hourly b) daily c) weekly d) yearly

25. Patches and update are regularly released by software companies to tackle security problems found
in …………. a) programs b) hardware c) people ware d) peripheral

26. …………….is the practice of keeping data protected from corruption and unauthorized access. (a) Data
measurement (b) Data security (c) Data protection (d) Data control

27. Which of these is not a type of security control ……?(a) access control (b) auditing (c) encryption(d)
storage

28. .………….. security mechanism uses mathematical schemes and algorithm to scramble data into
unreadable text. (a) Encryption (b) Auditing (c) Authentication (d) Auditing

29. .…………. is the process of copying and archiving data so it may be used to restore original after a data
loss (a) Backup (b) Restore (c) Control (d) Saving

30. …..……… is the computer professional responsible for the configuration, administration and
maintenance of a database (a) Programmer (b) System administrator (c) Database administrator (d)
System analyst

Theory

1. Explain crash recovery.

2. Explain the following terms in crash recovery (i) Media recovery (ii) Check point (iii) The Write - Ahead
log protocol

3. Mention five (5) duties of a database administrator.


4. Define backup and list its importance in data security

5. State three routine computer maintenance

You might also like