0% found this document useful (0 votes)
24 views9 pages

Ss 3 Data Processing Mock 2 Exam 2nd Term

The document is a mock examination paper for Data Processing at Maduka University College, covering various topics related to computer systems, data processing, and software applications. It includes objective questions and descriptive tasks, assessing knowledge on computer generations, data management, file organization, and practical skills in Microsoft Excel and Word. The paper is structured into two sections, with Section A focusing on multiple-choice questions and Section B requiring detailed explanations and problem-solving.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views9 pages

Ss 3 Data Processing Mock 2 Exam 2nd Term

The document is a mock examination paper for Data Processing at Maduka University College, covering various topics related to computer systems, data processing, and software applications. It includes objective questions and descriptive tasks, assessing knowledge on computer generations, data management, file organization, and practical skills in Microsoft Excel and Word. The paper is structured into two sections, with Section A focusing on multiple-choice questions and Section B requiring detailed explanations and problem-solving.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

MADUKA UNIVERSITY COLLEGE

SECOND TERM MOCK II, 2024/2025 ACADEMIC SESSION


SUBJECT: DATA PROCESSING CLASS: SS 3 TIME: 50MINS FOR OBJECTIVES
SECTION A (Objective Test: Choose the correct answer from options A– D)
Choose the right option from the Objectives questions in this section, kindly check and read the questions well before
attempting the questions.
1. The first-generation computers made use of A. low level programming language. B. high level programming
language. C. Object-oriented programming language. D. Procedural programming language.
2. Microprocessor was used as the main electronic component of the A. first generation computers. B. second
generation Computers. C. third generation computers. D. fourth generation computers.
3. The act of producing information from figures, text or images is called data A. collation. B. conversion C.
preparation. D. processing.
4. The following are primary sources of information exceptA. Questionnaire B. publicationC. observationD. interview.
5. Which of the following factors is not considered when classifying computers?A. SizeB. TypeC. LocationD. Purpose
6. Which of these channels would enable business transactions between a buyer from Nigeria and a seller from
Ghana?A. e-portalB. e-libraryC. e-commerce D. podcasting.
7. The ICT application which helps to resolve road congestion at junctions isA. automatic teller machine.B. automatic
traffic marshal.C. street light.D. traffic light.
8. The main components of the central processing unit (CPU) of the computer are.A. register and memory.B. control
unit and register.C. control unit and ALU D. ALU and BUS.
9. Stages in data processing cycle include the following except dataA. collation.B. gathering.C. parsing.D. processing.
10. At what stage of information processing is data validation carried out?A. Data analysisB. Data collectionC. Data
processingD. Data summarization
11. The media which enable electromagnetic signals to be transmitted through free space is known asA. unguided
media.B. intranet.C. guided media.D. Ethernet.
12. Information that stimulates both the senses of hearing and sight is calledA. audio information.B. audio-visual
information.C. video information.D. visual information.
13. The following are advantages of networking exceptA. spamming.B. sharing of resources.C. communication.D.
backup.
14. Which of the following devices would not transmit signals from one point to another?A. Telephone line B.
ModemC. Fiber opticsD. Coaxial cable
15. Another term for Uniform Resource Locator (URL) isA. website address.B. IP addressC. DomainName
D. data link.
16. The main component of the first-generation computer was A. microchip Transistor C. integrated circuit D.
electronic valve
17. The number 1011001012 in denary is A.753 B.653C.357 D.356
18. The term Garbage-In-Garbage-out is used to explain the characteristic of the computer in terms of A. storage B.
speed C. power D. accuracy.
19. The types computer that counts in discrete form only is referred to as A. analog B. digital C. hybrid D. mainframe
computer.
20. Which of the following media involves point to point communication? A. radio B. satellite C. telephone D.
Television
21. fourth generation computer application can execute the following operations except. A. digging of drainages B.
drainage channel design C. management recreational facilities D. payroll management
22.When information is conveyed from one space to another it is referred to as information. A. retrieval B. translation
C. transmission D. transportation
23. The protocol for transferring files from one machine to another is A. SNMP B. SMPT C. FTP D. FAT
24. MR David Adeleke has an office complex with 20 room. What type of network is suitable for connecting all the
computers in their various rooms into a single network.
A. LAN B. MAN C.PAN D.WAN
25. An operating system that enables more than one user to access the same the same data is called. A. multi-tasking
Os B. C. multi user D. single user
26. The feature of a word document that show the page number of words and error found in a document is the
A. menu B. scroll bar C. status bar D. title bar
27. The following software are web browsers excepts. A. Firefox B. Google chrome C. Linux D. opera
28. The erratic movement of the mouse pointer is usually caused by A. damaged driver B. dirty mouse ball C. Bad
mouse cable D. outdated driver
29. The use of the internet to perform illegal activities is generally called. A. cyber-crime B. packet sniffing C. phishing
D. spamming
30. Security breaches in computing cannot be prevented through the use of A. antivirus B. encryption C. firewall D.
firmware
31. A server is a computer that provides services to other computers called …… A clients B. peers C. Routers D.
switches
32. ………. is the string that specifies the path to the file that you wish to retrieve. A. Host name B. Data Path C.
Protocol D. Web
33. The HTML stands for A. Hypertext Machine Language B. Hypertext markup Language C. Hyper translation machine
language D. No idea
34. One of these shortcut keys helps to inserts a new slide in current presentation? A. Ctrl+N B. Ctrl+MC.Ctrl+S D. All
of above
35. A system analyst is a person who. A. design flowchart B. design and implement new solution C. trains computer
users D. writes complex computer program.
36. The function of the SQL statement SELECT studentID surname, HouseNameFROM student is that it
A. deletes the listed fields from students table B. hides the selected fields from students table C. highlight the listed
fields from students tableD. retrieves the listed fields from students’ table.
37. A file organization that contains a reference number is called A. direct access B. indexed access C. random access
D. sequential access.
38. The following media are used for information transmission except. A. television B. radio C. magazine D. diary
39.To prevent the loss of data in the computer it is better to implement file. A. backup B. maintenance C. checks D.
access.
40. Which of the following terms is not a feature of distributed database? A. multiple storage B. Replication C. Single
server D. fragmentation.

Data Processing PAPER II


Paper 2 will last for 1-hour 10min
Attempt all questions from this section 40 marks

1. Explain the following


i. Disk formation 2mks
ii. Data backup 2mks
iii. Virus scan 2mks
1B. Explain the following four types of file organization
(i)Heap(ii) Sequential (iii) Hash (iv) Cluster4mks
2. Identify four uses of Point on sale2mks
b. explains the classification of computer based on type 2mks
c. what is a function in excel? 2mks
d. what is cell refencing 2mks
di. identify two types of cellreferencing 2mks
3.
ITEM QUANTITY
TEXTBOOK 12
EXERCISE 6
PENCI; 5
CALCULATOR 10
PHONE 2

(a) Outline the steps to


i. Create a bar chart on the worksheet such that the items would be labeled on the chart and the
percentage on each included.
ii. Add to a table, a new column and row
iii. State on function in Ms excel that can be used to determine the item with the highest quantity.
iv. Outline the steps to add page border to a document using Art Design Tool in Ms word
4. As a secretary you instructed to submit a report to your boss a detailed statistical analysis was included excluding
chart, your boss wishes to receive this report in soft and hard copy. Identify the component and program that will
make this possible including a backfile 10 mks
MOCK EXAMINATION 2024/2025 SESSION
DATA PROCESSING SS 3
MARK GUIDE
SECTION A
1A 2D 3D 4B 5C 6C 7B 8C 9C 10 A
11 A 12 B 13 A 14 B 15 A 16 D 17 B 18 D 19 B 20 A
21 A 22 C 23 C 24 A 25 C 26 C 27 C 28 B 29 A 30 D
31 A 32 B 33 B 34 B 35 B 36 D 37 B 38 D 39 A 40 C

SECTION B
1a.
(i)Disk formatting is the configuring process of a data storage media such as a hard disk drive, floppy disk or
flash drive for initial usage.
(ii) Data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore
the original after a data loss event.

(iii) Virus scans: this is the process where antivirus search through your system to locate and remove any
malicious threats on your device.

Heap File Organization


An unordered file, sometimes called a heap file, is the simplest type of file organization.
Records are placed in file in the same order as they are inserted. A new record is inserted in the last page of
the file; if there is insufficient space in the last page, a new page is added to the file. This makes insertion
very efficient. However, as a heap file has no particular ordering with respect to field values, a linear search
must be performed to access a record. A linear search involves reading pages from the file until the
required is found.

Sequential File Organization:


In a sequential file organization, records are organized in the sequence by which they were added. You
cannot insert a new record between existing records, but only at the end of the last record. It is a simple file
organization that allows you to process batches of records in the file without adding or deleting anything.
However, to access a particular record, processing must run through all the other records above it because
it does not generate any random key to identify the location of the record.

Hash File Organization


In a hash file, records are not stored sequentially in a file instead a hash function is used to calculate the
address of the page in which the record is to be stored.
The field on which hash function is calculated is called as Hash field and if that field acts as the key of the
relation then it is called as Hash key. Records are randomly distributed in the file so it is also called as
Random or Direct files. Commonly some arithmetic function is applied to the hash field so that records will
be evenly distributed throughout the file.

Cluster File Organization


A traditional file system is a hierarchical tree of directions and files Implemented on a raw device partition
through the file system. Clustered file organization is not considered good for large databases. In this
mechanism, related records from one or more relations are kept in the same disk block, that is ordering of
records is not based on primary key or search key.

2 Uses of POS (choose any four)

(i) it is used for intra bank transfer


(ii) it is used for inter bank transfers
(iii) it is used to check account balance
(iv) it is used for printing of mini statement of account
(v) it is used for bank withdrawal
2aii)

-Analog computer system is the very old computer system which operates on the mathematical variables in
the form of continuously changeable physical quantities/entities like mechanical, electrical, hydraulic, etc.
They use continuous values rather than discrete values so they work on analog signal. At the time of at the
time of the 1950s–1960s these analog computers were first used. Analog computers are limited in
accepting the problems and also they can never be extremely accurate.

-Digital computers are the computer systems/machines which uses the binary number system, which has
two digits: 0 and 1 and performs many computational tasks. It processes the data represented in discrete
and the main three components of digital computers are input, processing and output. The first digital
computer was designed for numerical computations in the late 1940s. Digital computers give results with
more accuracy as it is not dependent upon physical quantities for processing a task.

2c A function is a predefine formula that perform calculates using specific value in orderly manner

2d. A cell referencing in Excel refers to the value of a different cell or cell range on the current worksheet or
a different worksheet within the spreadsheet.
2di (i)Relative
(ii)Absolute

3. Solution
Ai. Create bar chart
Select the data range
Click on insert from the menu bar
Select bar chart
Choose the chart design that has items and percentage.
ii. add new column
click on the columu label
right click and select insert
add row
click on the row number
right click and select insert
iv. function to determine item with highest quantity
Max function/=MAX (cell range)
v. Steps to add page border
Click on page border
On the page border tab, click on art drop down button
Select the desired art design
Click ok
4. Programs

Ms word and Ms excel

Component (hardware)

i. Computer
ii. Printer
iii. Flashdrive
iv. Backup file
Can be any storage device

You might also like