First Term Examination

Class : SSS 3

.Subject : Data Processing

Duration : 2 Hours

Name : __________________________________

Section A : Objective Question

instruction : Read the question carefully and pick from the options lettered a – d, the one that best complete the given sentences

1. Data models describe _________ data for storage in data management systems (a) structured (b) unstructured (c) integer (d) alphabetic

2. Which of this is not an example of standard data model? (a) ISO 10303 (b) ISO 15926 (c) IDEAS GROUP d) Good shepherd

3. _________ key is a field in a relational table that matches a primary key of another table (a) foreign (b) surrogate (c) primary (d) candidate

4. ___________ is graphical representation of entities and their relationships to each other (a) Entity-Relationship Diagram (b) Entity-Relationship Picture (c) Entity-Relationship Data (d) Entity-Relationship Symbol

5. A roof covers a building describes ___________ relationship.  (a) one-to-one (b) one-to-many (c) many-to-many(d) none of the above

6. __________ is a database table that has been reduced to certain fields.   (a) Table   (b) An index    (c) Table model    (d) Network model

7. The copy of an index is always in _________ form.    (a) duplicate    (b) field    (c) sorted    (d) domain

8. The ________ index can take place only if the data records are sorted on the search key field.  (a) unclustered   (b) insert    (c) update    (d) clustered

9. A __________ can contain several unclusterd indexes   (a) data file   (b) primary   (c) check   (d) index

10. Index contain a value and ______________.    (a) pointer  (b) sign  (c) update   (d) model

11. ___________ is an index in which the search key contains some candidate key. (a) Unique index   (b) An index   (c) composite   (d) sparse index

12. __________ can be created on a non- key attribute.   (a) primary index   (b) dense index    (c) secondary index   (d) sparse index

13. A sparse index contains one entry for each _________ of records in the data file. (a) page   (b) table    (c) row   (d) column

14. _________ is the one in which not all fields in the Search key are bound to constant.  (a) dense index   (b) composite search key   (c) secondary index   (d) range query

15. _________ is when the search key for an index contain several fields.   (a) primary index   (b) composite search key   (c) secondary index   (d) unique index

16. Maintenance is necessary on computer to avoid ____________(a) hardware failure  (b) stealing  (c) invasion  (d) crime

17. Excess heat accelerates the deterioration of the delicate _______ in the system.  (a) vacuum  (b) transistors   (c) circuits   (d) particles

18. Dust and dirt are the most common cause of  _________.  (a) leakage   (b) overheating   (c) breakage   (d) spooling.

19. __________ is used to remove dust, dirt and hair from the keyboard.   (a) Vacuum cleaner   (b) Brush   (c) Old rag   (d) Paper towels

20. It is advisable to wear an ___________ to reduce transferring static electricity from your body to the computer.   (a) hand glove   (b) anti – static wrist strip  (c) coat   (d) dust cover

21. Which of the following is not a software maintenance?   (a) Virus   (b) Spyware   (c) Hard disk   (d) Registry removal

22. The software maintenance that involves developing and deploying solutions to problems is ______________.   (a) corrective   (b) adaptive   (c) preventive   (d) perfective

23. The software maintenance that takes care of the changes that occur in software maintenance is called ________  (a) adaptive  (b) corrective  (c) perfective (d) preventive

24. Disk cleaning should be done ______________  (a) hourly  (b) daily  (c) weekly  (d) yearly.

25. Patches and update are regularly released by software companies to tackle security problems found in ____________. (a) programs  (b) hardware  (c) people ware  (d) peripheral

26. ____________ is the practice of keeping data protected from corruption and unauthorized access. (a) Data measurement (b) Data security (c) Data protection (d) Data control

27. Which of these is not a type of security control ____________?  (a) access control  (b) auditing  (c) encryption   (d) storage

28. ____________ security mechanism uses mathematical schemes and algorithm to scramble data into unreadable text.       (a) Encryption    (b) Auditing    (c) Authentication (d) Auditing

29. ___________ is the process of copying and archiving data so it may be used to restore original after a data loss (a) Backup (b) Restore (c) Control (d) Saving

30. _________ is the computer professional responsible for the configuration, administration and maintenance of a database.   (a) Programmer    (b) System administrator   (c) Database administrator   (d) System analyst

31. The process by which a database is moved back to a consistent and usable state is called ___________. (a) cash recovery (b) crash recovery (c) past recovery (d) undo recovery

32. The recovery algorithm that uses no-force and steals approach is _____________(a) ARIAS (b) ARIES (c) ARREARS (d) ARIS

33. ARIES works in __________ Phases. (a) three  (b) two  (c) one  (d) four

34. Which of these is not a crash recovery type?  (a) Aries   (b) Media recovery  (c) Check pointing  (d) UNDO

35. _________ Crash recovery uses backup files. (a) Check point  (b) ARIES  (c) Media recovery  (d) Atomicity

SECTION B : THEORY

Instruction : Answer any four (4) questions in this section.

1a. Define the following terms :

(i) Entity 

(ii) Attribute   

(iii) Relationship

1b. What is cardinality?

1c. Mention and explain three types of relationship in ERD with one example each

2a. Define the following :

(i) Primary Key           

(ii) Foreign key   

(iii) Composite primary key

2b. Explain the term Normal Form.

2c. Design a database of your choice indicating the primary key and the foreign key

3a. Differentiate between clustered index and unclustered index .

3b. State two reasons why clustered index is expensive to maintain.

3c. What is an index?

4a. Create a student table with the following fields: name, age, and scores of 5 records. Create an index using a composite keys name and age. (show the table and SQL statements)

4b. Differentiate between a unique index and a range query.

4c. What is composite search key?

5a. List and explain the four software maintenance.

5b. State four benefits of software maintenance

5c. State three routine computer maintenance


One response to “Data Processing / ICT SSS 3 FIRST TERM EXAMINATION”

  1. que es un backlink Avatar

    this website is my inspiration , very good design and style and perfect written content.

Leave a Reply

Your email address will not be published. Required fields are marked *