0% found this document useful (0 votes)
15 views6 pages

Mock Questions For Grade 12

The document contains a series of mock questions for Grade 12 students focused on data processing, covering topics such as computer security, maintenance, networking, and software applications. It includes multiple-choice questions as well as theoretical questions requiring detailed answers. The questions assess students' understanding of computer concepts, terminology, and practical applications in information technology.

Uploaded by

scnnmn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views6 pages

Mock Questions For Grade 12

The document contains a series of mock questions for Grade 12 students focused on data processing, covering topics such as computer security, maintenance, networking, and software applications. It includes multiple-choice questions as well as theoretical questions requiring detailed answers. The questions assess students' understanding of computer concepts, terminology, and practical applications in information technology.

Uploaded by

scnnmn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

DATA PROCESSING MOCK QUESTIONS FOR GRADE 12

1. The following are destructive software except A. drivers B. worms C. trojan horses D. logic

2. A program developed to protect the computer from malicious software is referred to as


A. trojan B. driver C. antivirus D. spyware

3. Computer virus cannot be transmitted by A. downloading files B. E-mail attachment C. pen


drives D. Typing on keyboard

4. A program designed to detect and prevent malicious programs from a computer system is
A. spyware B. passcode C. malware D. firewall

5. Which of the following is not an antivirus? A. Avast B. AVG C. Compaq D. Norton

6. Which of the following is not a preventive maintenance measure? A. Regular update of


the operating system. B. Proper shut down of the system. C. Use of uninterrupted power
supply. D. Data recovery.

7. Routine check operations on computers in order to ensure its continued functioning is known
as computer A. services. B. repairs. C. maintenance. D. installation.

8. Which of the following is one of the tools used to maintain the computer? A. Blower. B.
Calliper. C. Cotton wool. D. Kerosene.

9. Which of the following is not a good computer maintenance practice? A. Blowing the system
unit with a blower. B. Blowing the keyboard with a blower. C. Cleaning the screen with a wet
cloth. D. Cleaning the CD-ROM.

10. Which of the following substance is used for cleaning the mouse ball? A. Distilled
water. B. Engine oil. C. Isopropyl alcohol. D. Kerosene

11. A computer system under use was found to be unusually slow, freezes often and very dusty.
What is needed to correct this problem? A. Hit the system unit with a blower. B. Delete
some files. C. Change the location of the computer. D. Perform maintenance procedure.

12. A student in the school hostel was able to upload some personal details on the school portal
via the school's WiFi .
The ISP and the hostel are both domiciled in the school premises.
What type of network is illustrated above? A. MAN B. WAN C. LAN D. PAN

13. Which of the following data elements ranks highest in size? A. Field. B. Byte. C. Record.
D. Bit.
14. A pointing device that controls cursor movement on the screen is A. trackball. B.
plotter. C. keyboard. D. monitor.

15. Artificial intelligence is a feature of A. fifth generation computers. B. third generation


computers. C. second generation computers. D. fourth generation computers.

16. Database Administrator is a professional who A. handles packet sniffing in a network. B.


designs, implements and maintains a database. C. performs data entry in a database. D. tests
and detects vulnerabilities on hardware devices and software.

17. The aim of administering questionaire is to collect A. data. B. information.

C. specimen. D. statistics.

18. Computer malware is detected by A. adware. B. logic bomb. C. antivirus.

D. antiglare.

19. The speed of access to files in a random access file compared to other file organization
methods is A. very slow. B. the same. C. relatively fast. D. slow.

20. The volume of data that can be sent from one point to another in a given time period is
called A. broadband. B. byte. C. baud. D. bandwidth.

21. A type of file organization that stores data in the order of their arrival is called

A. indexed-sequential file organization. B. hashed file organization. C. random file organization.


D. sequential file organization.

22. Which of the following computer types represents data as variable and continuous values?
A. Analogue computer. B. Mainframe computer. C. Microcomputer.

D. Digital computer.

23. The following feature are found in the toolbox of CorelDraw application except

A. elipse tool. B. text tool. C. marque tool. D. rectangle tool.

24. The ruler feature in MS Word that is used to indent the second and subsequent lines of a
paragraph is A. right indent. B. hanging indent. C. left margin. D. left indent.

25. The database tool that allows the user to select and filter data from multiple tables is
referred to as A. Form. B. Table. C. Query. D. Report.

26. One of the major differences between WAN and MAN is that
A. WAN used routers while MAN uses switches.

B. WAN connects countries while MAN connects continents.

C. WAN has no limited coverage while MAN has limited coverage.

D. WAN incorporate servers while MAN does not incorporate servers.

27. An application of ICT which allows a person to participate in a meeting from a remote
location is called? A. Telepresence. B. Podcasting. C. Broadcasting. D. Blogging.

28. The capacity of a communication channel is referred to as A. Bandwidth.

B. Baud rate. C. Bit flow. D. Data flow.

29. A desktop computer is switched on and the monitor displays an error message which reads:
No input signal. The likely cause of this error is

A. Disconnected VGA. B. Power failure. C. Low memory. D. Defective monitor.

30. One quality of a computer programmer A. Ability to teach. B. Friendliness.

C. Punctuality to work. D. Excellent analytical thinking.

31. A file organization method that has reference which identifies a record in relation to other
records is called A. Sequential file organization. B. Serial file organization

C. Indexed file organization. D. Random file organization

32. One application of ICT in education is A. Optical Mark Reader. B. Electronic Fund
Transfer. C. Automated Teller Machine. D. Magnetic Ink Character Recognition.

33. The process of sending and receiving information from one place to another is called
information A. Synchronization. B. Transfer. C. Transmission. D. Technology.

34. The subdivision of tracks in a hard disk is called A. Record. B. Row. C. Sector.

D. Cluster.

35. Any meaningful fact and knowledge item that can be expressed in words and numbers is
called

A. Knowledge base. B. Information. C. Database. D. Data.

36. Which of these measures would not secure data in a database? A. Encryption. B. Data
integration. C. Personal Identification Number. D. Username and password
37. The prevention of data from corruption and unauthorized access is a unction of data A.
security. B. secrecy. C. integrity. D. coding.

38. Maintaining the value and content of data is part of data A. coding. B. integrity. C.
secrecy. D. security.

39. The protection of database against compromise is known as A. data pass wording. B. data
protection. C. database encoding. D. database security.

40. Ensuring the correctess and consistency of data is referred to as data A. security. B.
reliability. C. productivity. D. integrity.

41. The following are examples of relational operators except A. < B. > C. = D. *

42. Which of the following is not a normal form in relational database? A. 1NF B. 2NF C. 3NF
D. BCNF

43. The correctness and completeness of data in a database is its A. constraint B.


independence C. integrity D. Redundancy

44. Which of the following is an audio-visual medium for receiving information? A. Fax B. Film
strip C. Flip chart D. Television

45. The following are examples of operating systems by Microsoft corporation except A. MS-
Dos B. Windows NT C. XP D. Vista

46. The feature that prevents accidental overwriting when values are entered and cells are
selected on a worksheet is called A. Automatic calculation B. Automatic recalculation
C. Dynamic update D. Locked cell

47. The feature in Word Processing which compares every word with an electronic dictionary is
A. HelpB. Page alignment C. Thesaurus D. Word count

48. Which of these is not a database security tip? A. Updating anti-malware software B.
Enforce restriction on internet access C. Fight off hacking attacks with intrusion detection
technology D. Regular backup of data on removable media

49. A computer store data in units called A. bit B. database C. field D. File

50. Multi-tasking allows the ______ to access several programs at the same time. A.
computer B.CPU C. RAMD. VDU
51. While typing, a series of letters were highlighted and the keyboard key combination "Ctrl +
B" was executed. The highlighted letters would be a. underlined b. italicized c. deleted
d. Bold

52. In Word Processing applications, the symbols B, I and U are commonly used buttons found
on the a. Standard toolbar b. Menu bar c. Formatting toolbar d. Drawing toolbar

53. A Word document can have any of these file extensions except a. .doc
b. .docx c. .jpg d. .rtf

54. ________ is a shortcut to save my document in Word Processing? a. Ctrl + s b. Ctrl + x


c. Ctrl + v d. Ctrl + p

55. Information that stimulates both the senses of hearing and sight is called A. audio
information B. audio-visual information C. video information D. visual information

56. Which of the following sources of information is received by the user in visual mode only?
A. Television B. Radio C. Photograph D. Computer

57. One of these is an example of non-electronic information transmission medium.

A. Television B. Animal C. Internet D. Satellite

58. The unprocessed fact is called . A. Data B. Processing C. Information D. All of the
above

59. Duplicating copyrighted electronic content is . A. Ethical B. Unethical C. Moral D. All of


the above

60. The lab should be kept at all time. A. Covered B. Clean C. Pure D. None of the above

THEORY

Answer any four questions


1a. What is database security?

b. Highlight three importance of database security.

c. Mention four data models.

2a. Define a computer network.

b. List and explain four computer networks.


c. What is a router?

3a. Define the following terms.

(i) Disk formatting.

(ii) Data backup.

(iii) Virus scan.

b. List three symptoms of virus attack.

4a. Give two examples of word processing application.

b. Distinguish between the "Save" and "Save As" commands.

c. Write out three shortcuts in Ms Word.

5a. What is internet?

b. Define an internet browser.

c. List five internet browsers.

6a. Define an operating system.

b. State two functions of an operating system.

c. List two differences between an operating system and an application software.

You might also like