0% found this document useful (0 votes)
8 views

SS3 DP EXAM_2ND

The document contains examination questions for the Data Processing subject for SS3 students at Solid Rock International School, covering various topics related to computers and data management. It includes multiple-choice questions in Section A and open-ended questions in Section B, addressing concepts such as computer hardware and software, data security, networking, and the Internet. The exam is designed to assess students' understanding and knowledge in data processing over a duration of 2 hours.

Uploaded by

francisdaniel242
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

SS3 DP EXAM_2ND

The document contains examination questions for the Data Processing subject for SS3 students at Solid Rock International School, covering various topics related to computers and data management. It includes multiple-choice questions in Section A and open-ended questions in Section B, addressing concepts such as computer hardware and software, data security, networking, and the Internet. The exam is designed to assess students' understanding and knowledge in data processing over a duration of 2 hours.

Uploaded by

francisdaniel242
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

SOLID ROCK INTERNATIONAL

SCHOOL,
LUGBE, ABUJA.
SECOND TERM EXAMINATION QUESTIONS 2024/2025
SESSION

SUBJECT: DATA PROCESSING TIME: 2 HOURS CLASS: SS3


SECTION A

Choose the correct answer from the options

1. An electronic device that can accept data, process data and give information
as output is called ______________.
(a) input (b) processor (c) output (d) computer
2. The person regarded as the modern father of computer is ___________.
(a) Blaise Pascal (b) Francis Edet (c) Charles Babbage (d) Joseph Jacquard
3. Which of the following is not a source of data collection?
(a) Observation (b) Interview (c) Questionnaire (d) Classification
4. A field in a database table is also known as ____________.
(a) index (b) relation (c) attribute (d) key
5. The type of data entered into a table in database follow a set of rules known
as __________.
(a) protocols (b) regulations (c) algorithms (d) constraints
6. Social networking does not promote ___________.
(a) personal publicity (b) business expansion (c) e-commerce (d) e-payment
7. Which of the following is not a computer professional body in Nigeria?
(a) Nigeria Computer Society (NCS)
(b) Nigeria Internet Group (NIG)
(c) Nigeria Labour Computer (NLC)
(d) IT Industry Association of Nigeria (ITAN)
8. A program developed to protect the computer from malicious software is
referred to as ________.
(a) trojan (b) driver (c) anti-virus (d) spyware
9. In a relational database management system, files are organized as relations
and ____________.
(a) tuples (b) modules (c) tables (d) protocols
10. Which of the following is an alphabetic data?
(a) Bed (b) Ax44jj (c) AB + CD (d) %
11. Which of the following is not used for online shopping?
(a) Master card (b) Credit card (c) Verve card (d) Sim card

12. In Database Management System (DBMS), linking entities is used to


represent?
(a) Attributes (b) Objects (c) Relationships (d) Relations
13. An operating system will perform the following except ________.
(a) Files and folders management
(b) Storage locations
(c) User profile creation
(d) Protection from surge
14. Which of the following is not an ancient medium for transmitting
information?
(a) Fire lighting (b) Beating of drums (c) Telephone (d) Whistling
15. Which of the following are parts of a computer processor?
(a) CPU and Main memory
(b) Control unit and ALU
(c) Operating system and Applications
(d) Main memory and Storage
16. Safety measures to be observed when using the computer include all of the
following except ____________.
(a) use of antiglare protector
(b) sitting posture
(c) maintaining a dust free environment
(d) dropping liquids in the computer room
17. Which of the following is used to retrieve specific information from
database tables?
(a) Index (b) Query (c) Report (d) Table
18. Magazines and brochures can be produced using a __________.
(a) data processing software
(b) graphics software
(c) presentation software
(d) web authoring software
19. The following are advantages of networking except ____________.
(a) spamming
(b) sharing of resources
(c) communication
(d) back up
20. Extracting information in Database Management System (DBMS) involves
___________.
(a) sorting (b) querying (c) editing (d) cross referencing

21. The following are advantages of a database management except _________.


(a) restriction of unauthorized access to data
(b) compromise of data integrity
(c) provision of multiple interfaces to different classes of users
(d) provision of backup and recovery
22. Which of the following is not considered when classifying computers?
(a) Size (b) Type (c) Location (d) Purpose
23. The socket into which computer peripherals are plugged is known as
_________.
(a) hardware (b) port (c) wall socket (d) motherboard
24. Computer system is applicable in the school system for the following except
____________.
(a) employment of artisans
(b) typing of question papers
(c) recording of attendance and marks
(d) preparation of scores sheet
25. Identify an operating system from the following software
(a) Writer (b) Ms One note (c) Ms Access (d) Linux
26. While typing a series of letters were highlighted and the keyboard
combination “Ctrl + B” was executed. The highlighted letters would be ____.
(a) underlined (b) italicized (c) deleted (d) bold
27. Microprocessor was used as the main electronic component of the ______.
(a) 1st generation (b) 3rd generation (c) 2nd generation (d) 4th generation
28. The ICT application which helps to resolve road congestion at junction is ___.
(a) automatic teller machine
(b) automatic traffic marshal
(c) street light
(d) traffic light
29. __________ allows users to create websites and blogs and customize them
with their own text, photos and movies.
(a) Google maps (b) Web plus (c) Web (d) Web page
30. Which of the following is true about digital computers?
(a) They consist of magnetic core memory
(b) They are mainly used for scientific purposes
(c) They represent numbers through a string of binary digits
(d) They recognize data as a continuous measurement of physical quantity
31. Companies that provide Internet access are referred to as ______________.
(a) Fixed network operators
(b) Network service providers
(c) Internet service providers
(d) Internet network operators
32. Which of the following is a secondary storage device?
(a) RAM (b) Bubble memory (c) Floppy disk (d) EPROM
33. The advantages of electronic data processing include the following except
________.
(a) automatic processing
(b) hacking
(c) fast and reliable processing
(d) storage capacity
34. The exchange of information over a network follows a set of rules called ___.
(a) transmission rules (b) transfer rules (c) channels (d) protocols
35. A search engine is a ___________.
(a) program that searches engines
(b) hardware component of a computer
(c) computer engine that searches a database
(d) tool that searches the web
36. The _____ is a collection of web pages, just like a book with multiple pages.
(a) opera (b) browser (c) website (d) protocol
37. In graphic packages, the process of removing unwanted part of an image is
known as ________.
(a) shaping (b) resizing (c) editing (d) cropping
38. Routine check operations on computers in order to ensure its continued
functioning are known as computer _________.
(a) services (b)repairs (c) maintenance (d) installation
39. You have opened your account on Gmail with rocky as username. Your mail
address would be __________.
(a) www.rockygmail@com
(b) rockygmail@com
(c) rocky@gmail.com
(d) www.rockygmail.com
40. Relationships between tables in a relational model are created by _______.
(a) foreign keys (b) determinants (c) composite keys (d) candidate keys
SECTION B
Attempt any three questions
1. (a) What is a computer?
(b) Define computer software and hardware. Give examples.
(c) Name 8 places where computer can be used.
(d) What are the benefits of a computer?

2. (a) Differentiate data security and database security.


(b) State the importance of data security.
(c) List 5 roles of a database administrator.
(d) Define encryption.

3. (a) Who is a computer professional?


(b) List 4 computer professionals and explain their duties.
(c) State 4 qualities of a computer professional.
(d) Mention 5 professional bodies.

4. (a) Define the following: i. Database


ii. Database management
(b) State 5 examples of DBMS
(c) List 3 uses of Database management system
(d) What is Microsoft Access?

5. (a) Define the term “computer virus”.


(b) List 5 examples of computer virus.
(c) State 4 sources through which a computer can be infected with a
virus.
(d) Mention 4 ways we can prevent computer virus.

6. (a) Define networking.


(b) Discuss 3 types of network.
(c) What is the difference between Internet and Intranet?
(d) List 5 resources shared on the network.

7. (a) Explain crash recovery.


(b) Differentiate between media recovery and check pointing.
(c) List steps to clean DVD drive lens.
(d) State the concepts of ARIES in crash recovery.

8. (a) Define Internet.


(b) List 6 Internet browsers.
(c) State 3 benefits and 3 abuses of Internet.
(d) Explain the following terms: i. Cyber space
ii. Electronic mail
iii. Protocol
iv. Internet service provider

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy