Second Term Examination (Mock Examination) Data Processing SS 3 – Exam Questions
SECOND TERM EXAMINATION
(MOCK EXAMINATION)
DATA PROCESSING
SENIOR SECONDARY SCHOOL SS 3
SECTION A
Choose the correct answer from the options.
1. An electronic device that can accept data,process data and give information as output is called _____________________.
[a] input
[b] processor
[c] output
[d] computer
2. The person regarded as the modern father of computer is _____________________.
[a] Blaise pascal
[b] samule morland
[c] Charles babbage
[d] Joseph jacquard
3. Which of the following is not a source of data collection?
[a] observation
[b] interview
[c] questionnaire
[d] classification
4. A field in a database table is also known as _____________________.
[a] index
[b] relation
[c] attribute
[d] key
5. The type of data entered into a table in database follow a set of rules known as _____________________.
[a] protocols
[b] regulators
[c] algorithms
[d] constraints
6. Social networking does not promote _____________________.
[a] personal publicity
[b] business expansion
[c] e – commerce
[d] e – payment
7. Which of the following is not a computer professional bodies in Nigeria?
[a] Nigeria computer society (NCS)
[b] Nigeria internet group ( NIG )
[c] Nigeria Labour computer ( NLC )
[d] IT industry association of Nig (ITAN)
8. A program developed to protect the computer from malicious software is referred to as _____________________.
[a] trojan
[b] driver
[c] anti virus
[d] spyware
9. In a relational database management system, files are organized as relations and _____________________.
[a] tuple
[b] modules
[c] tables
[d] protocols
10. Which of the following is an alphabetic data?
[a] Bed
[b] Ax44jj
[c] AB + CD
[d] %
11. Which of the following is not used for online shopping _____________________.
[a] Master card
[b] Credit card
[c] Verve card
[d] Sim card
12. In Database management system (DBMS), Linking entities is used to represent ?
[a] attributes
[b] objects
[c] relationships
[d] relations
13. An operating system will perform the following except _____________________ .
[a] files and folders management
[b] storage locations
[c] User profile creation
[d] protection from surge
14. Which of the following is not an ancient medium for transmitting information?
[a] fire lighting
[b] beating of drums
[c] telephone
[d] whistling
15. Which of the following are parts of a computer processor?
[a] CPU and main memory
[b] Control unit and ALU
[c] Operating system and application
[d] main memory and storage
16. Safety measures to be observed when using the computer include all of the following except _____________________ .
[a] Use of antiglare protector
[b] Sitting posture
[c] maintaining a dust free environment
[d] dropping liquids in the computer room.
17. Which of the following is used to retrieve specific information from database tables?
[a] lndex
[b] query
[c] report
[d] table
18. Magazines and brochures can be produced using a _____________________ .
[a] data processing software
[b] graphics software
[c] presentation software
[d] web authoring software
19. The following are advantages of networking except _____________________ .
[a] spamming
[b] sharing of resources
[c] communication
[d] back up
20. Extracting information in Database Management System ( DBMS ) involves _____________________.
[a] sorting
[b] querying
[c] editing
[d] cross referencing
21. The following are advantages of a database management except _____________________ .
[a] restriction of unautorised access to data
[b] compromise of data integrity
[c] provision of multiple interfaces to different classes of users
[d] provision of backup and recovery.
22. Which of the following is not considered when classifying computers _____________________.
[a] size
[b] type
[c] location
[d] purpose
23. The socket into which computer peripherals are plugged is known as _____________________.
[a] hardware
[b] port
[c] wall socket
[d] mother board
24. Computer system is applicable in the school system for the following except _____________________.
[a] employment of artisans
[b] typing of question papers
[c] recording of attendance and marks
[d] preparation of scores sheet
25. ldentify an operating system from the following software
[a] writer
[b] MS one note
[c] MS Access
[d] Linux
26. While typing a series of letters were highlighted and the keyboard combination “Ctrl + B“ was executed. The highlighted letters would be _____________________ .
[a] underlined
[b] italicized
[c] deleted
[d] bold
27. Microprocessors was used as the main electronic component of the _____________________.
[a] 1st generation
[b] 3rd generation
[c] 2nd generation
[d] 4th generation
28. The ICT applicaion which helps to resolve road congestion at junctions is _____________________ .
[a] automatic teller machine
[b] automatic traffic marshal
[c] street light
[d] traffic light
29. _____________________ allows users to create websites and blogs and customize them with their own text, photos and movies.
[a] google maps
[b] web plus
[c] iWeb
[d] webpage
30. Which of the following is true about digital computers?
[a] they consist of magnetic core memory
[b] they are mainly used for scientific purposes
[c] they represent numbers through a string of binary digits .
[d] they recognize data as a continuous measurement of physical quantity.
31. Companies that provide internet access are referred to as _____________________ .
[a] fixed network operators
[b] network service providers
[c] internet service providers
[d] internet network operators
32. Which of the following is a secondary storage device?
[a] RAM
[b] bubble memory
[c] floopy disk
[d] EPROM
33. The advantages of electronic data processing including the following except _____________________.
[a] automatic processing
[b] hacking
[c] fast and reliable processing
[d] storage capacity
34. The exchange of information over a network follows a set of rules called _____________________ .
[a] tranmissions rules
[b] transfer rules
[c] channels
[d] protocols
35. A search engine is a _____________________ .
[a] program that searches engines
[b] hardware component of a computer
[c] computer engine that searches a database
[d] tool that searches the web
36. The _____________________ is a collection of web pages, just like a book with multiple pages.
[a] opera
[b] browser
[c] website
[d] protocol
37. In graphic packages, the process of removing unwanted part of an image is known as _____________________ .
[a] shaping
[b] resizing
[c] editing
[d] cropping
38. Routine checks operations on computers in order to ensure its continued functioning is known as computer _____________________.
[a] services
[b] repairs
[c] maintenance
[d] installation
39. You have opened your account on Gmail with Rocky as user name, your mail address would be _____________________.
[d] www.rockygmail.com
40. Relationships between tables in a relational model are created by _____________________ .
[a] foreign keys
[b] determinants
[c] composite key
[d] candidate keys
41. The process in which a relation is broken into smaller relations called _____________________ .
[a] fragmentation
[b] replication
[c] database
[d] middle ware
42. Which generation of computers made use of integrated circuits?
[a] Fourth
[b] Third
[c] Second
[d] First
43. The process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event is called _____________________ .
[a] control access
[b] back ups
[c] security files
[c] application security
44. Computer virus cannot be transmitted by _____________________ .
[a] downloading files
[b] E – mail attachment
[c] Pen drives
[d] typing of keyboard
45. The moral principles that regulate the use of computers , its accessories and environment are called _____________________ .
[a] ethics
[b] conduct
[c] attiude
[d] appreciation
46. A computer professional who studies an existing system with the a view to evolving a computer – based system from it is _____________________ .
[a] system analyst
[b] system administrator
[c] computer programmer
[d] computer engineer
47. Data processed into its useful form is referred to as _____________________ .
[a] unique data
[b] raw data
[c] knowledge
[d] information
48. A _____________________ is a collection of data, usually stored disk.
[a] Entity
[b] organisation
[c] file
[d] cable
49. In word processing applications, the symbols B, I and U are commonly used button found on the _____________________ .
[a] standard toolbar
[b] menu bar
[c] formatting toolbar
[d] drawing toolbar
50. _____________________ is the use of software, hardware, and procedural methods to protect applications from external threats .
[a] data security
[b] application security
[c] data management
[d] applications files
SECTION B
Attempt any five questions in this section.
QUESTION 1
a. What is a Computer?
b. Define computer software and hardware; Give examples.
c. Name 8 places where computer can be used
d. What are the benefits of a computer?
QUESTION 2
a. Differentiate Data security and database security.
b. State the importance of data security.
c. List 5 roles of a data base administrators.
d. Define Encryption.
QUESTION 3
a. Who is a computer professional?
b. List four computer professional and explain their duties.
c. State four qualities of computer professional.
d. Mention 5 professional bodies.
QUESTION 4
a. Define the following:
i. Database
ii. Database management.
b. State 5 examples of DBMS
c. List 3 uses of database management system.
d. What is microsoft access?
QUESTION 5
a. Define the term computer virus.
b. List five examples of computer virus.
c. State four sources through which a computer can be infected with a virus .
d. Mention 4 ways we can prevent computer from virus.
QUESTION 6
a. Define Networking.
b. Discuss three types of network .
c. What is the difference between internet and intranet?
d. List 5 resources shared on the network .
QUESTION 7
a. Explain Crash recovery.
b. Differentiate between media recovery and check pointing .
c. List step to clean DVD drive lens .
d. State the concepts of ARIES in crash recovery.
QUESTION 7
a. Define internet.
b. List six internet browsers
c. State three benefits and three abuses of internet.
d. Explain the following terms:
i. Cyber space
ii. Electronic mail
iii. Protocol
iv. Internet service provider
GOODLUCK