0% found this document useful (0 votes)
912 views4 pages

DP Ss2 Exam 1st Term

Uploaded by

monimaker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
912 views4 pages

DP Ss2 Exam 1st Term

Uploaded by

monimaker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

COVENANT FOUNDATION SCHOOLS

ABUJA
FIRST TERM EXAMINATION, 2024/2025 ACADEMIC SESSION
SUBJECT: DATA PROCESSING CLASS: SS2. DURATION : 1HR 30 MINS
SECTION A : Multiple choice/ objective questions. Instruction: answer all questions

1. Data models describe ……… data for 124 123B Smith 467 209-0 102-8
storage in data management systems
(a) True (b) False (c) Uncertain (d)
(a) structured (b) unstructured (c)
Indecisive
integer (d) alphabetic
10. The default object in a database used
2. In one-to-many relationship, the table
for data entry is (a) data sheet (b)
in the ‘one’ side is called_____ and on
query (c) forms d) model
‘many’ is called_______
11. Which of the following Fields is
(a) Child, Parent (b) Parent, Child (c)
suitable to use as primary key. (a)
Brother, Sister d) Father, Son
Name (b) Email (c) School Fees (d) Age
3. ……….. key is a field in a relational
12. In table design, which field data type
table that matches a primary key of
is used for date of birth (a) text (b)
another table (a) foreign (b) surrogate
number (c) date/time (d) currency
(c) primary (d) candidate
13. One significance of data models is (a)
4. ……………. is graphical representation
Volatility (b) Reusability (c) Rigidity (d)
of entities and their relationships to
All of the above
each other
14. In the approach of data modeling,
(a) Entity-Relationship Diagram (b)
____ data modeling illustrate the
Entity-Relationship Picture (c) Entity-
specific entities, attribute and
Relationship Data (d) Entity-
relationship involved in business
Relationship Symbol
function.
5. A roof covers a building describes
(a) Conceptual Data Modeling (b)
…………relationship (a) one-to-one (b)
Logical Data Modeling (c) Flat data
one-to-many (c) many-to-many(d)
Modeling. (d)Physical Data Modeling
none of the above
15. The processing of structuring and
6. ………. is an instruction used to retrieve
organizing data is referred to as
data from the database in a specified
______.
format (a) Form (b) Report (c) Query
(a) Data Structure (b) Data
(d) Table
Organization (c) Data Manipulation (d)
7. In a database table, a category of
Data Modelling
information is called_____________
16. Maintenance is necessary on
(a) tuple b) field c) record (d) relation
computer to avoid ……….
8. This key uniquely identifies each
(a) hardware failure (b) stealing (c)
record (a) primary key (b) key record
invasion (d) crime
(c) unique key (d) field name
17. Excess heat accelerates the
9. The table below is in First Normal
deterioration of the delicate ……… in
Form
the system. (a) vacuum (b) transistors
S Ad A A C Class2 (c) circuits (d) particles
v l
I a
18. Dust and dirt are the most common
D s cause of ……… (a) leakage (b)
s overheating (c) breakage d) spooling.
1 19. ……….. is used to remove dust, dirt and
123 123A James 555 102-8 104-9 hair from the keyboard. (a) Vacuum
cleaner (b) Brush (c) Old rag (d) Paper administrator (c) Database
towels administrator (d) System analyst
20. It is advisable to wear a/an ………… to 31. The process by which a database is
reduce transferring static electricity moved back to a consistent and usable
from your body to the computer. (a) state is called………. (a) cash recovery
hand glove (b) anti – static wrist strip (b) crash recovery (c) past recovery (d)
(c) coat d) dust cover. undo recovery
21. Which of the following is part of 32. The recovery algorithm that uses no-
software maintenance? (a) Virus (b) force and steals approach is ………….
Spyware (c) Regular updating (d) (a) ARIAS (b) ARIES (c) ARREARS (d) ARIS
Registry removal. 33. ARIES works in ……………. Phases (a) 3
22. The term “Data Model” refers to two (b) 2 (c) 1 (d) 4
different things - data organization 34. In the approach of data
and _______ (a) Data Model. (b) modelling ____ data modelling
Data Processing (c) Data Structure. identifies the highest level
(d) Data Organization relationship between different
23. One of the following is an example of entities.
a DBMS package. (a) Ms Word (b) (a) Conceptual Data Modelling (b)
Ms Power-point (c) Ms Access (d) Logical Data Modelling (c) Flat data
Ms Outlook Modelling (d) Physical Data
24. Disk cleaning should be done ……….. Modelling
(a) hourly b) daily (c) weekly (d) never 35. Another name for field type is known
25. Patches and update are regularly as ____ (a) File type (b) Name type (c)
released by software companies to Record type (d) Data type
tackle security problems found in the 36. What is the main purpose of data
…………. (a) programs (b) hardware (c) processing in a computer system? (A.) To
people ware (d) peripheral generate data (B.) To store information
26. …………….is the practice of keeping (C.) To make decisions (D.) None of the
data protected from corruption and above
37. Which of the following is NOT a step in
unauthorized access. (a) Data
measurement (b) Data security (c) the data processing cycle? (a). Input (b).
Data protection (d) Data control Processing (c) Output (d)Formatting
27. Which of these is not a type of 38. . What is the primary function of a
security control ……? (a) access control database security system? A. To prevent
(b) auditing (c) encryption(d) storage unauthorized access to data B. To
28. .………….. security mechanism uses increase processing speed C. To store
mathematical schemes and algorithm large amounts of data D. To create data
to scramble data into unreadable text. backups
(a) Encryption (b) Auditing (c) 39. What is the primary purpose of
Authentication (d) Auditing computer maintenance?
29. .…………. is the process of copying and A. To upgrade hardware components
archiving data so it may be used to B. To prevent system crashes
restore the original after a data loss C. To increase the computer’s speed
(a) Backup (b) Restore (c) Control (d) D. All of the above
Saving 40. Which of the following is a type of
30. …..……… is the computer professional preventive maintenance for
responsible for the configuration, computers?
administration and maintenance of a A. Installing antivirus software
database (a) Programmer (b) System
B. Replacing hard drives B. Operating system security
C. Upgrading the CPU C. Basic hardware settings like CPU
D. Increasing RAM and memory
41. ____ is a collection of computer D. Internet connection
software that enables users to 49. The primary purpose of normalization
define, create and maintain a is to ____ (a) Eliminate redundant
database. (a) Database Management data (b) Ensure data dependencies (c)
System (b) Normalization(c) Data Allow Update, insertion and deletion
Model (d) Normal Form (d) Create tables
42. Which of the following is an example 50. ____ is the process of efficiently
of software maintenance? organizing data in a database. (a)
A. Cleaning dust from a fan Database (b) Normalization (c) Form
B. Upgrading to a newer version of an (d) Model
operating system 51. ____ normal form must meet the
C. Replacing a damaged monitor requirement of first and second. (a)
D. Reinstalling a hard drive 1NF (b) 2NF (c) 3NF (d) 4NF
43. In computer maintenance, what is the 52. Another name for data Element is
purpose of updating software? ____. (a) Attribute (b) Key (c) Entity
A. To clean the system (d) Relationship
B. To improve system performance 53. ____ are objects or concepts within
and fix bugs the data model. (a) Attributes
C. To replace the CPU (b)Relationship (c) Cardinality
D. To defragment the hard drive (d) Entity
44. How often should you perform routine 54. Which of the following is an example
computer maintenance? of a security risk associated with
A. Once every two years databases?
B. Only when there is a problem A. Data warehousing
C. At least once every 6 months B. Database normalization
D. Once a month C. Database hacking
45. What is the first step in maintaining D. Data migration
the computer system? 55. What is the purpose of a firewall in
A. Installing a firewall database security?
B. Backing up important files A. To manage user passwords
C. Scanning for viruses B. To limit unauthorized access to the
D. Reinstalling the operating system database
46. ____ is the logical design method C. To back up database records
which minimizes duplicate or D. To monitor CPU performance
redundant data and design flaws. 56. What type of database attack involves
(a)Database (b) Normalization (c) accessing a database without proper
Form (d) Data Model authorization to retrieve or alter data?
47. One of the goals of normalization A. Phishing
process is ____ (a)Eliminate B. Malware
redundant data (b) Ensure data C. SQL Injection
independencies (c) Allow Update, D. Data Breach
insertion and deletion(d) Create tables 57. Which database security technique is
D. Disk Management used to store a copy of a database for
48. What does a computer's BIOS setting recovery in case of failure?
allow a user to configure? A. Data Encryption
A. User password B. Database Replication
C. Database Backup (b) Differentiate between a foreign key and a
D. Data Scrubbing primary key.
58. Which of the following is a
recommended approach to securing
sensitive data in a database?
A. Limiting database queries
B. Encrypting the data at rest and in
transit
C. Running database reports
frequently
D. Using low-quality passwords
59. All computers have common basic
functions which are?
(a)Recording, processing and output
(b) Input, storage and managing
(c) Input, processing, storage and
output
(d) Processing, sorting, classifying and
output.
60. Sort the following within numerical
order; 23.43 – 25.75 – 13.5 – 12.2

(a) 12.2 - 13.5 - 23.43 - 25.75


(b) 12.2 - 13.5 - 25.75 - 23.43
(c) 12.2 - 25.75 - 13.5 - 23.43
(d)13.5 - 12.2 - 23.43 - 25.75

SECTION B THEORY

Answer any five questions in this section

1. (a) Define the following terms (i) Entity (ii)


Attribute (iii) Relationship
(b). List and explain three types of data
models
2a. Define data modelling.
b. List three (5) approaches to Data modelling.
3a. Explain the following: (i) Data (ii) Field
(iii) Record (iv) File
(b) State the use of entity entity-relationship
diagram.
4a. Discuss Normal form.
(b) State the rules for carrying out second
normal form.
5a. Using tables, explain the differences between
primary key and foreign key.
(b) State the rules for carrying out first normal
form.
6a. List five (5) qualities of a good primary key.

You might also like