First Term Examination
Class : SSS 3.
Subject : Data Processing
Duration : 2 Hours
Name : ___________________________________
Section A : Objective Questions
Instruction : Read the question carefully and pick from the options lettered a – d, the one that best complete the given sentences
1. Data models describe _________ data for storage in data management systems (a) structured (b) unstructured (c) integer (d) alphabetic
2. Which of this is not an example of standard data model? (a) ISO 10303 (b) ISO 15926 (c) IDEAS GROUP d) Good shepherd
3. _________ key is a field in a relational table that matches a primary key of another table (a) foreign (b) surrogate (c) primary (d) candidate
4. ___________ is graphical representation of entities and their relationships to each other (a) Entity-Relationship Diagram (b) Entity-Relationship Picture (c) Entity-Relationship Data (d) Entity-Relationship Symbol
5. A roof covers a building describes ___________ relationship. (a) one-to-one (b) one-to-many (c) many-to-many(d) none of the above
6. __________ is a database table that has been reduced to certain fields. (a) Table (b) An index (c) Table model (d) Network model
7. The copy of an index is always in _________ form. (a) duplicate (b) field (c) sorted (d) domain
8. The ________ index can take place only if the data records are sorted on the search key field. (a) unclustered (b) insert (c) update (d) clustered
9. A __________ can contain several unclusterd indexes (a) data file (b) primary (c) check (d) index
10. Index contain a value and ________ _. (a) pointer (b) sign (c) update (d) model
11. ___________ is an index in which the search key contains some candidate key. (a) Unique index (b) An index (c) composite (d) sparse index
12. __________ can be created on a non- key attribute. (a) primary index (b) dense index (c) secondary index (d) sparse index
13. A sparse index contains one entry for each _________ of records in the data file. (a) page (b) table (c) row (d) column
14. _________ is the one in which not all fields in the Search key are bound to constant. (a) dense index (b) composite search key (c) secondary index (d) range query
15. _________ is when the search key for an index contain several fields. (a) primary index (b) composite search key (c) secondary index (d) unique index
16. Maintenance is necessary on computer to avoid ____________
(a) hardware failure (b) stealing (c) invasion (d) crime
17. Excess heat accelerates the deterioration of the delicate _______ in the system. (a) vacuum (b) transistors (c) circuits (d) particles
18. Dust and dirt are the most common cause of _________. (a) leakage (b) overheating (c) breakage (d) spooling.
19. __________ is used to remove dust, dirt and hair from the keyboard. (a) Vacuum cleaner (b) Brush (c) Old rag (d) Paper towels
20. It is advisable to wear an ___________ to reduce transferring static electricity from your body to the computer. (a) hand glove (b) anti – static wrist strip (c) coat (d) dust cover
21. Which of the following is not a software maintenance? (a) Virus (b) Spyware (c) Hard disk (d) Registry removal
22. The software maintenance that involves developing and deploying solutions to problems is ______________. (a) corrective (b) adaptive (c) preventive (d) perfective
23. The software maintenance that takes care of the changes that occur in software maintenance is called ________ (a) adaptive (b) corrective (c) perfective (d) preventive
24. Disk cleaning should be done ________ (a) hourly (b) daily (c) weekly (d) yearly
25. Patches and update are regularly released by software companies to tackle security problems found in ____________. (a) programs (b) hardware (c) people ware (d) peripheral
26. ____________ is the practice of keeping data protected from corruption and unauthorized access. (a) Data measurement (b) Data security (c) Data protection (d) Data control
27. Which of these is not a type of security control ____________? (a) access control (b) auditing (c) encryption (d) storage
28. ____________ security mechanism uses mathematical schemes and algorithm to scramble data into unreadable text. (a) Encryption (b) Auditing (c) Authentication (d) Auditing
29. ___________ is the process of copying and archiving data so it may be used to restore original after a data loss (a) Backup (b) Restore (c) Control (d) Saving
30. _________ is the computer professional responsible for the configuration, administration and maintenance of a database. (a) Programmer (b) System administrator (c) Database administrator (d) System analyst
31. The process by which a database is moved back to a consistent and usable state is called ___________. (a) cash recovery (b) crash recovery (c) past recovery (d) undo recovery
32. The recovery algorithm that uses no-force and steals approach is _____________
(a) ARIAS (b) ARIES (c) ARREARS (d) ARIS
33. ARIES works in __________ Phases. (a) three (b) two (c) one (d) four
34. Which of these is not a crash recovery type? (a) Aries (b) Media recovery (c) Check pointing (d) UNDO
35. _________ Crash recovery uses backup files. (a) Check point (b) ARIES (c) Media recovery (d) Atomicity
SECTION B : THEORY
Instruction : Answer any four (4) questions in this section.
1a. Define the following terms :
(i) Entity (ii) Attribute (iii) Relationship
1b. What is cardinality?
1c. Mention and explain three types of relationship in ERD with one example each
2a. Define the following :
(i) Primary Key (ii) Foreign key (iii) Composite primary key
2b. Explain the term Normal Form.
2c. Design a database of your choice indicating the primary key and the foreign key
3a. Differentiate between clustered index and unclustered index.
3b. State two reasons why clustered index is expensive to maintain.
3c. What is an index?
4a. Create a student table with the following fields: name, age, and scores of 5 records. Create an index using a composite keys name and age. (show the table and SQL statements)
4b. Differentiate between a unique index and a range query.
4c. What is composite search key?
5a. List and explain the four software maintenance.
5b. State four benefits of software maintenance
5c. State three routine computer maintenance