0% found this document useful (0 votes)
16 views6 pages

SS3 DP Exam - 1ST

The document contains the first term examination questions for Data Processing for SS3 students at Solid Rock International School, Lugbe, Abuja, for the 2024/2025 session. It includes multiple-choice questions covering topics such as virus detection, software maintenance, database management, and networking, as well as theory questions requiring detailed explanations. Students are instructed to answer three questions in total, with the first question being compulsory.

Uploaded by

francisdaniel242
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views6 pages

SS3 DP Exam - 1ST

The document contains the first term examination questions for Data Processing for SS3 students at Solid Rock International School, Lugbe, Abuja, for the 2024/2025 session. It includes multiple-choice questions covering topics such as virus detection, software maintenance, database management, and networking, as well as theory questions requiring detailed explanations. Students are instructed to answer three questions in total, with the first question being compulsory.

Uploaded by

francisdaniel242
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

SOLID ROCK INTERNATIONAL

SCHOOL,
LUGBE, ABUJA.
FIRST TERM EXAMINATION QUESTIONS 2024/2025 SESSION

SUBJECT: DATA PROCESSING TIME: 2 HOURS CLASS: SS3

SECTION A: OBJECTIVES

1. The …………… can be a sign of virus infection on the computer


A. Inability of the computer to boot B. Computer very hot while
using it C. Slow in executing tasks D. All of the above
2. How can virus be detected/prevented? A. avoid using computer in
the dark B. Always connect your computer to the light C. use
antivirus software D. Install virus defender in your system
3. The modification of software product after delivery to correct faults,
to improve performance or other attributes is known as ………...... A.
Computer Engineering B. Software Analyst C. Software
maintenance D. Program Documentation
4. One of the following is not a type of software maintenance
A. Adaptive B. Preventative C. Corrective D.
updativeness
5. Software maintenance helps to ……..……. A. correct computation
errors B. change the originality of the software C. speed up
computer connectivity D. improve software performance
6. The first maintenance service one can give to a malfunctioning
system is
A. Restart the computer B. open up the system C. charge the hard
disk
D. Replace the RAM
7. To avoid total or complete loss of your document, always have ………
copy A. used copy B. virus free copy C. original copy D.
backup copy
8. Those that designed or write virus programs are regarded as
……………
A. virus agent B. computer enemies C. program destroyer D.
programmers
9. What is the proper way to shut down the computer?
A. Remove the power cord immediately after work B. Switch
off the power control while in use C. Close all the running
programs, click on start and click on Shut down D. Close all
running programs and click on Sleep off and click ok
10. One of the following is not a means of computer maintenance
A. Clean the case B. Use water to wash a dirty system C.
check the power protector D. Have good ventilation in the
computer Lab
11. One of the following is a good example of an Extranet
network. A. Car
tracking B. Speed limit control C. USB network D. ATM
network
12. The process of keeping data protected from unauthorized
access is known as ……………………
A. Networking Security B. Database Control C. Data
security
D. Integrity control
13. The permission to access a resource is known as A.
Privilege
B. Authorization C. Accessibility D. Control
14. The …………….. is the process of observing a database so as
to be aware of the actions of the users A. data control
B. Auditing
C. data security D. data accounting
15. One of the following is a role of a database administrator:
A. Planning for backup and recovery of database information B. Using
information to fight enemies C. Connecting the computer peripherals
for all the users D. Computing digital operation required by the
database owners
16. The primary aim of system backup is …………….. A. secure
the system
B. recover the data after its loss event C. updating and
save data
permanently D. repositioning the data properly for use
17. The process in which the database is moved back to a consistent
and usable state is known as …………… A. Restoration of data
B. Normalization of data C. Crash recovery D. data stability
18. ARIES stand for ……………. A. Array Recovery in Semantics B.
Algorithm for recovery and isolation exploiting segments C.
Algorithm for exposing segments D. Always rise I exposing
semantics
19. The following are the three phases of recovery except ……….. A.
Analysis phase
B. REDO phase C. REPAIR phase D. UNDO phase
20. The …………. ……….is type of database system that seeks to
improve
performance through parallel implementation of various
operations
A. Distributed database B. Personal database C. Distribution
database D. Parallel database
21. One of the following is a type of distributed database.
A. Heterogeneous distributed database B. Hierarchical
distributed
database C. Historical distributed database D. None of
the above
22. The following are the architecture of DBMs except ………… A. Client
server B. Collaborating C. Connecting server D. middle
ware server
23. The process in which a relation is broken into smaller relations
is known as ……………..
A. Fragmentation B. Rationality C. Recovery D.
Replication
24. Computer network is simply referred to as ……….. A. Web. B.
Topology
C. Network D. Internet
25. The …………… is the type of networking used in the computer
Lab and other areas like as building, an office or small
geographical area
A. Extranet B. MAN C. LAN D. WAN
26. The type of network that is only open for internal employees
of a company is known as ………... A. network B. internet
C. intranet D. extranet
27. One of the following resources can be shared by the computer on
the network A. UPS B. Keyboard C. Printer
D. VGA
28. All the following are types of virus except ……… A. worm
B. macro virus C. logic Bombs D. atomic virus
29. The following are the architecture of DBMs except ……… A.
Client-server B. User-server C. Collaborating Server
D. Middleware
30. What is programming? A. The process of using computer to
perform
tasks B. The process of writing instructions or codes for
computer to
follow and execute a task C. The process of designing
computer to meet the desire of the users D. None of the
above
31. One of the following is a source of virus infection. A.
Using computer always B. E-mail Attachment C.
updating program D. Running programs on computer
32. The ……………. is the person that plan, implements and
maintain database security. A. data staff manager
B. ICT manager C. Database Administrator D. programmer
33. Virus can be defined as ………… A. programs that can run on
the computer B. program written to destroy other programs
and computer resources C. programs that helps to rebuild
the computer D. program that helps other programs
34. Who is a programmer? A. a person that can speak
computer’s language B. a person that work
perfectly on CorelDraw C. a person specialized in writing
instructions and codes for computer to follow and perform a
given task D. a person specialized playing games and
watching videos online.
35. One of the following is not responsible for data loss in
database management
A. poor database design B. database error C.
hardware failure
D. closing database application
36. The process of retrieving data from a computer’s hard drive
that has been lost due to system crash is known as A. data
recovery B. process recovery C. system recovering D.
data backup
37. Modem stands for ……….. A. modern system control B. mainframe
operating device memory C. modulator/demodulator D modulation
distribution
38. The term used to describe a terrorist attack on a computer
and the information stored is called …….…… A. computer attack
B. terrorist attack C. cyber terrorist D. internet terrorist

39. Authentication is the process of ………. A. designing and


modifying data B. retrieving and updating information C.
verifying the authenticity of the user before given access to
resources D. providing users with the required information

40. The ……………. is the key of an index that contain several


fields
A. index B. secondary C. primary D. composite
search key

SECTION B (THEORY)
ANSWER THREE QUESTIONS IN ALL (QUESTION ONE IS
COMPULSORY)

1. (a) Mention any four (4)roles of a database administrator in data


security
(b) As a Manager of a Company what type of database system
will you
recommend for the company and why?
(c) List the type of networking and explain them
2. (a) Outline any two characteristics of parallel and distributed
database respectively
(b) Differentiate between primary index and secondary index
(c) Discuss any four sign of virus infection on the computer
3. (a) Who is database administrator?
(b) Differentiate between backup and application security
(c) Explain any three types of security control on the data
4. (a) Write short note on the following: i. Database
Security
ii. Indexes using composite search key iii. Primary index
iv. Encryption v. Fragmentation.
(b) State any five preventive maintenance guides
(c) State step-by step procedures to encrypt or password your file or
document

5. (a) Explain any four sources of virus infection


(b) List any five types of virus you know
(c) Differentiate between Intranet and Extranet
6. (a) Discuss networking in details
(b) Briefly explain the three phases of recovery procedure after crash
(ARIES)
(c) State any three importance of Distributed and Parallel database
architecture
BEST OF LUCK

You might also like