0% found this document useful (0 votes)
11 views

Data Processing

The document outlines the 2024/2025 mock examination for SS3 students in Data Processing, consisting of objective questions and theory sections. It includes 60 objective questions worth 30 marks and 10 theory questions worth 40 marks, covering topics such as network types, data security, authentication, and operating systems. Students are instructed to answer all questions in the objective section and any four from the theory section.

Uploaded by

Sam Okebaram
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Data Processing

The document outlines the 2024/2025 mock examination for SS3 students in Data Processing, consisting of objective questions and theory sections. It includes 60 objective questions worth 30 marks and 10 theory questions worth 40 marks, covering topics such as network types, data security, authentication, and operating systems. Students are instructed to answer all questions in the objective section and any four from the theory section.

Uploaded by

Sam Okebaram
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CATHOLIC DIOCESE OF ABAKALIKI

DEPARTMENT OF EDUCATION
2024/2025 MOCK EXAMINATION FOR SS 3
SUBJECT: DATA PROCESSING TIME: 2HRS.
SECTION A: OBJECTIVE QUESTIONS (30 Marks)
INSTRUCTION: Answer all the questions in this section. Each question
carries ½ marks.
In this section, choose from options lettered A - D, the answer to the question
and write the Alphabet that bears the correct answer.
1. All these are types of network except ____________ (a) LAN (b) WAN (c) MAN
(d) SON
2. __________is a computer network that covers a metropolis such as a city,
campus etc. (a) LAN (b) MAN (c) peer to peer (d) internet
3. ___________ is basically a network that is local to a company, (a) Internet
(b) Extranet (c) intranet, (d) Content network
4. ___________refers to limiting information access and disclosure to an
authorized users "the right people" and preventing access or disclosure to
unauthorized ones "the wrong people", (a) Data availability (b) data
confidentiality (c) data integrity (d) data security.
5. One of these is a type of indexes, (a) primary and secondary indexes (b)tertiary
and secondary indexes (c) clustered and flat indexes (d) dense and non-dense
indexes
6. __________ is a file with pair of keys and pointer for every record in the data
file. (a) sparse index (b) dense index (c) clustered index (d) non-clustered index
7. ___________is the index That controls the current processing order of a file,
(a)Primary index (b) secondary index (c) clustered index (d) non-clustered
index.
8. Sparse index in database is a file with pairs of keys and pointer for_________in
the data file, (a) Every record (b) every block (c) every node (d) every pointer.
9. A table can have multiple non-clustered indexes. True or False.
10. ___________is a computer network around an individual, (a) PAN (b) WAN
(c) LAN (d) MAN
11. Convert hexadecimal number E6F to decimal number (a) 369510 (b) 379410
(c)360510 (d) 369710
12. Digitalization of data simply means__________. (a) turning data into digital
(b)data been controlled by digital means (c) this is the process of converting
information into digital format (multi-level format) (d) This is the process of
changing data into analogue format
13. Convert decimal number 53 to binary number, (a) 110iao2(b) 0110102
(c)1101012 (d) 111010,
14. Software piracy is one of the ___________ of internet (a) use (b) importance
(c) abuse (d) advantage
15. __________is an example of presentation package, (a) excel (b) words
(c)power point uses (d) Corel draw
16. Wedding card can be designed in _______(a) logo (b) graphic package
(c)excel (d) Mozilla
17. The 3rd generation computer________ as its processing power. (a) Thermionic
(b) integrated circuit (c) electronic engine (d) transistor
18. There are___________types of operating systems, (a) 3 (b) 2 (c) 1 (d) 5
19. Standard keyboard has____________number of functions key. (a) 12 (b) 10
(c)11 (d) 20
20. A worksheet is a collection of__________(a) cell (b) rows (c) columns
(d)workbooks
21. The intersection between rows and columns in a worksheet is
called__________ (a) icon (b) cell (c) grid (d) line
22. Data that have been converted into meaningful and useful context for specific
and user is best described as_____________(a) data processing
(b)digitalization (c) information (d) information transmission
23. A set of program that operates and manages the computer system activities is
called ___________(a) compiler (b) speaker (c) operating system (d)information
24. One of the following is an example of operating system, (a) Microsoft disk
operating system (b),Microsoft word (c) Excel (d) interface
25. GUI means (a) graphic user interface (b) graphic user information (c) graph
user interface (d) goods use of information
26. The primary function of the title bar is to___________. (a) display the content of
the document (b) display the name of program or document currently in use
(c)enhance document (d) beautify the document.
27. The following are examples of spreadsheet packages except (a) Microsoft
word (b) lotus 123 (c) super calc 5 (d) ms-excel
28. Operating system is an example of ____________ software, (a) cycle
(b)window (c) system (d) application
29. ____________is a special type of output device used to produce graphs and
pictures. (a) monitor (b) scanner (c) printer (d) plotter
30. The act of viewing and moving about between documents on computer network
is called ____________. (a) browsing (b) linking (c) online (d) explorer.
31. can be defined as a list of keywords associated with a record or document used
especially as an aid in searching for information, (a) Unique (b) index (c) one
(d)indexing.
32. In computer science a____________is a particular way of storing and
organizing data in a computer so that it can be used efficiently, (a) Data (b) data
structure (c) data integrity (d) Auditing.
33. The search key for an index can contain several field such keys are
called______ (a) Encryption (b) vulnerability (c) composite search key (d) query
key.
34. ___________is the protection of the database against intentional and
unintentional threat that may be computer based or non-computer based,
(a)Computer network (b) computer (c) database security (d) integrity.
35. _______ is the process of creating indexes for record collection, (a) Indexes
(b) indexing (c) dense (d) sparse.
36. A table can have__________non-clustered indexes because they don't affect
the order in which the rows are stored on the disk like clustered indexes, (a)One
(b) multiple (c) none of the above (d) All of the above.
37. Because a clustered index determines the order in which the rows will be
stored on disk, having more than one clustered index on one table
is_________(a) good (b) wrong (c) impossible (d) possible.
38. ___________ refers to user actions involving input of data to a computer and
computer response to such inputs, (a) Data structure {b) data entry
(c)composite search key (d) firewall.
39. In installing a database, __________ a protective barrier that keeps unknown
connections at bay. (a) Firewall (b) Auditing (c) Encryption (d) backup
40. All these are types of security measures except (a) Auditing (b) recovery
(c)firewall (d) backup (e) None of the above
41. ___________works by filtering through connections in the network and only
allowing trusted computers or users to access the database, (a) Auditing
(b) firewall (c) Encryption (d) backup
42. ___________is when a supervisor, or a database manager scan the database
to ensure nothing has changed, (a) Encryption {b) firewall (c) Auditing (d)backup
43. ___________is another database security measure in which the data are
encrypted or made illegible for anyone who accesses the database, (a) Backup
(b) firewall (c) Encryption (d) Auditing
44. ___________ is when a data are stored in another area or medium, (a) back up
(b) firewall (c) Encryption (d) Auditing
45. CIA means (a) code, integrity, Availability (b) confidentiality, integrity,
Auditing (c) confidentiality, integrity, Availability (d) confidentiality, integrity,
Availability
46. All these are importance of data security except________(a) To protect data
from corruption (b) To prevent unauthorized data observation (c) To ensure
the data confidential (d) To allow anybody to have access whenever they want.
47. __________is any mechanism by which a system grants or revokes the right to
access some data, or perform some action, (a) Security (b) recovery (c) Access
control (d) control
48. __________is the process of identifying an individual usually based on a
username and password, (a) Access control (b) Encryption (c) Authentication
(d)Auditing
49. __________is the process of giving individual access to system based on their
identity. (a) Authentication (b) Auditing (c) Authorization (d) Access control
50. Authentication is the process of identifying an individual usually based on a
username and_________. (a) code (b) pin code (c) password (d) log on
51. ___________is the weakness in a computing system that can result in harm to
the system or its exploitation by hostile person or organization, (a) Real time
(b)vulnerability (c) compliance program (d) data integrity
52. __________ refers to the trustworthiness of information resources, (a) Data
confidentiality (b) data availability (c) data integrity (d) data security.
53. __________ is a person responsible for the installation, configuration, upgrade,
administration, monitoring and maintenance of database in an organization,
(a)Data admin (b) database man (c) database developer, (d) Database
administrator.
54. All these are roles or functions of a database administrator except,
(a)Installation of new software (b) configure of hardware and software
(c)database design (d)all of the above.
55. __________is the process by which the database is moved back to a consistent
and usable state, (a) Crash (b) recovery (c) crash recovery (d) logging
56. ARIES means (a) Algorithm for Recovery and Isolation Exploiting Semantics
(b)Algorithm for Recovery and Isolation Exploiting Segment (c) Algorithm for
Recovery and Isolation Exploiting Scan.
57. The three phrases recovery works are__________(a) Analysis phrase, Redo
phase, Undo phase (b) Redo phase, Analysis phase, Reaction phase
(c)Analysis phase, Undo phase, Right phase (d) Redo phase, Analysis phase,
Recover phase.
58. __________is a connection of two or more computers and other communication
devices to facilitate communication and enable resources to be shared,
(a)Network (b) Networking (c) Hardware sharing (d) People ware sharing.
59. All these are advantages of networking except _________ (a) data sharing
(b) software sharing (c) Hardware sharing (d) People ware sharing.
60. LAN means (a) large area network (b) land area network (c) local area network
(d)line area network.

SECTION B: THEORY - (40 Marks)


Answer any FOUR questions only from this section. Each question carries
equal marks.
1a. Define Authentication,
(b) Mention three factors that can be used for authentication.
2a. What is Access Control? (b) Who is a database administrator?
3a. Define Computer virus, (b) State five types of virus.
4a. What is Auditing and backup? (b) List three examples of Antivirus software.
5a. List 4 examples of a web browser, (b) Write 5 benefits of the internet.
6a. Define database security, (b) Explain firewall and Encryption.
7a. Define Networking (b) Mention six types of network you know.
8a. Explain any four type of network (b) Mention two advantages of networking.
9a. Define Operating system, (b) Mention 3 examples of operating system.
10a. Mention 5 functions of operating system
(b) Differentiate between a web browser and a search engine

You might also like