100% found this document useful (3 votes)
3K views

SS3 Data Processing Pre-WAEC

This is the First Half Examination for Data Processing for SS3. This is to prepare them for their upcoming WAEC examination as this questions are standard.

Uploaded by

Ejiro Ndifereke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
3K views

SS3 Data Processing Pre-WAEC

This is the First Half Examination for Data Processing for SS3. This is to prepare them for their upcoming WAEC examination as this questions are standard.

Uploaded by

Ejiro Ndifereke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

GOOD SHEPHERD SCHOOLS

HOPE TOWN

SUBJECT: DATA PROCESSING CLASS: SS3 EDUCATOR: MR. EJIRO


CONTINUOUS ASSESSMENT TEST ONE (C.A.T 1)
SECTION A: OBJECTIVES
INSTRUCTION: Each question carries 1 mark each
1. What are data types? A. It specifies what type 8. Data redundancy produces ______ A. Data
of data is expected inside of each column in a integrity problems B. Recursive C. Candidate
table (e.g. Number, date, string) B. It specifies D. Relational models
how many tables you will create when you 9. ______ is a process to help reduce the
convert your Entity Relations Model to a likelihood of data anomalies A. Data integrity
Logical Data Model C. It specifies the problems B. Normalization C. RDBMS D.
database-name D. It counts how many Composite
attributes you have 10. ____ database tables often lead to various
2. Simple representations of complex real-world redundancy disasters in production databases
data structures A. Data models B. Model C. A. Detailed narrative B. 4NF C. Unnormalized
Data modeling D. Data D. Weak
3. The following are examples of Relationships 11. From a structural point of view ____ is better
except A. One-to-many (1:M) B. Many-to- than 1NF A. 2NF B. Determinant C. Derived D.
many (M:N or M:M) C. One-to-one (1:1) D. 1NF
Many-to-one (M:1) 12. A ______ must not contain a repeating group
4. The following are advantages of Hierarchical A. Unary B. Determinant C. Atomicity D.
Model except Relational table
A. Efficient with 1:1 relationships B. 13. A table that has all key attributes defined has
Parent/child relationship promotes conceptual no repeating groups and all its attributes are
simplicity and data integrity C. Database dependent on the primary key is said to be in
security is provided and enforced by DBMS D. _____ A. 1NF B. Relational table C. Database
Promotes data sharing type D. Atomic attribute
5. _______ uses graphic representations to 14. 1NF – 2NF and 3NF are _____ A.
model database components A. entity instance Normalization stages B. Transitive dependency
or entity occurrence B. Unified Modeling C. Atomic attribute D. Partial dependency
Language (UML) C. Entity Relationship Diagram 15. Within the database, tables can be
(ERD) D. Data Modelling Query normalized or brought to comply with
6. A table that is in 2NF and contains no ___________ Rules A. Normalization B.
transitive dependencies is said to be in ______ Hierarchical C. Atomic D. Prime
A. weak B. 3NF C. Atomic attribute D. BCNF 16. The use of Visual Display Unit was a
7. A ______ identifier is composed of more than breakthrough in the A. first generation
one attribute A. Composite B. Relational computers B. second generation computers C.
models C. Atomicity D. 3NF third generation computers D. fifth generation
computers C. heating effect D. burglar-proof
17. In hexadecimal systems D is equivalent to A. 28. Magnetic Ink Character Recognition is
15 B. 14 C. 13 D. 10 applied on A. voice recognition devices B.
18. The sum of 1102 and 1012 is A. 11012 B. 11102 mobile devices C. large data capturing
C. 11002 D. 10112 machines D. bank cheques
19. A company has four computer systems and 29. Internet banking entails A. applying
one printer and one scanner for their daily computer networks in banking operations B.
operations. One factor that can accomplish the applying computers to automate banking
company to connect all the devices in a operations C. generating tokens and one time
network is the need to A. provide efficient passwords for online payments D. using ATM
services B. save running cost C. share software for banking operations
only D. use a wireless connection 30. Which of the following parts of the computer
20. One similarity between the internet and ensures the smooth operation of its
intranet is that they both A. were invented by hardware? A. main memory B. control unit C.
the same company B. use the same technology auxiliary storage D. arithmetic and logic unit
C. have the same coverage D. are open to the 31. Basic computer operations include the
public following except A. control B. input C. output
21. The process of copying data or information D. process
from the internet to a personal computer is 32. One disadvantage of electronic data
termed A. browsing B. downloading C. processing is A. handling complex computation
retrieving D. surfing B. medium for effective storage C. processing
22. An entrepreneur who wishes to send digital data at a phenomenal speed D. vulnerability to
signal over a telephone line would need a A. attack
hub B. modem C. router D. switch 33. Which of the options A to D is not a medium
23. Graphical User Interface is considered user of information transmission A. cable B.
friendly because of the following reasons satellite C. television set D. wireless channel
except that it A. compels the user to learn all 34. One characteristics of a dirty mouse is that
the commands before operating the system B. the mouse A. is not recognized by the system
displays all the options available to the user B. disconnect itself from the system C. pointer
for easy access C. is easier for users to operate changes appearance D. pointer moves
and understand D. makes the icon and menus erratically
familiar to the users 35. One responsible way of using the computer
24. The symbols dialog box of MS Word is A. software piracy B. phishing C. pharming D.
application is located on the A. format menu ethical hacking
B. help menu C. insert menu D. view menu 36. Any activity carried out to protect the user
25. Pressing the key combination Ctrl + J on a from hazards while using the computer is
selected text in a Microsoft word document called A. computer ethics B. computer
would A. align the text B. deselect the text C. maintenance C. laboratory rules D. safety
justify the paragraph D. justapose the text measure
26. Merge button in spreadsheet application is 37. In order to protect on the world wide web
used to A. combine adjacent tables B. convert from threats, the user should A. install the
selected cells into a single cell C. merge two latest operating system version B. Install a
tables D. split a cell into two or more cells single user antivirus software C. Implement an
27. One advantage of the first generation internet security software D. deploy online
computers is A. processing speed B. portability transaction software
38. Responsibilities of a database administrator 45. Which of these channel would enable
include the following except performing A. business transactions between a buyer from
database backup B. data recovery C. network Nigeria and a seller from Ghana A. e-library B.
maintenance D. user authentication e-library C. e-commerce D. podcasting
39. The following tools are used for protecting 46. The website
the computer against virus attack except A. www.goodshepherdschools.edu.ng indicates
avast anti-virus malware B. kaspersky C. that the Good Shepherd Schools is A.
norton D. trojan horse commercial B .non-organization C. research
40. In the model furniture (table, chair, organization D. educational organization
wardrobe), furniture is A. relation B. schema C. 47. A special effect that controls the way slides
tuple D. attribute appear in power point presentation is called A.
41. Which of the following database operation word art B. transition C. theme D. animation
does not require a data manipulation language 48. The following are the attributes of computer
A. modification of information B. insertion of virus except the ability to A. modify other files
new information C. deletion of information D. B. replicate itself in order to spread to other
creation of information files and system C. execute without the user’s
42. The file organization method which allows approval D. warn the user before execution
records to be accessed in any sequence is A. 49. The performance of the computer can be
index B. random C. sequential D. serial enhanced by A. using larger monitor B. using
43. Providing access control to a school record is faster printer C. installing a scanner D.
the responsibility of a A. database increasing the memory size
administrator B. programmer C. system 50. The type of data entered into a table in
administrator D. system analyst database follow a set of rules known as A.
44. The first generation computers made use of protocols B. regulators C. algorithms D.
A. low level programming language B. high constraints
level programming language C. object oriented
programming language D. procedural
programming language

Note The Following


1. Write legibly as illegible hand writing will attract reduction of marks
2. You are to write out the questions before answering them, failure to do this will attract
reduction of marks

SECTION B: THEORY
ANSWER ALL QUWSTIONS PLEASE!!!!
QUESTION 1 – 10 Marks
a. Explain Database Model –2 marks

b. List five (5) types of Database Model – 2 marks


c. What are the significance of a Database Model – 2 marks

d. Difference between Primary Key, Composite Key and Foreign Key – 4 marks

QUESTION 2 – 10 Marks
a. Use the relational data model below to draw a hierarchical data model – 4 marks

Student Table

S_id S_name S_age


121 Simeon Mercy 14
118 Adesokan Ajibola 17
130 Joseph Precious 16

Grade Table

G_id S_name S_id


A1 Mathematics 121
A1 Data Processing 118
A1 Chemistry 118
B2 English Language 130

b. State four (4) classes of computer based on size – 2 marks

c. Explain the term Information and Communication Technology – 2 marks

d. State two ways ICT has impacted on the society – 2 marks

SECTION C: TEST OF PRACTICALS


QUESTION 3 – 10 Marks
The table below shows selected fields and Data Types in MS Access

Use it to answer the following questions below


What is the appropriate data type for:

i. Date of Birth ii. Fees – 2 marks

B. If MS Access is running, describe the procedure to:

i. Create a table with the fields as given above using design view – 2 marks

ii. Set the Mat. No. Field as the primary key – 2 marks

iii. Set the Full Name Field to a maximum of 50 characters – 2 marks

iv. set the input value for Date of Birth to medium date – 2 marks

QUESTION 4 – 10 Marks
Akimola Winner has just opened a computer business center within Good Shepherd Hope Town Campus

a. State three devices Akimola Winner needs to buy to start up his business center – 3 marks

b. State three computer services that may be provided in the business center – 3 marks

c. Give two application software needed in the business center – 2 marks

d. Outline one precaution that must be taken by Akimola Winner to ensure the safety of this computers if
he must accept documents or files in another device from his customer – 2 marks

QUESTION 5 – 10 Marks
Akomolede Samuel was tasked by Mr. Ejiro to make two reports on Microsoft word, his to bring it to Mr.
Ejiro for proper vetting.

a. Outline the steps to display the number of words, lines of text, number of pages and number of
paragraph

b. Akomolede Samuel is to display the two documents simultaneously, state the two ways this can be
made possible

(NOTE PLEASE: You are to properly outline the steps in each of the ways. Thanks)

c. Outline the steps Akomolede Samuel will take in protecting the document using password

d. Akomolede Samuel is to put the two documents in a folder name Mr_Ejiro Files and his to encrypt that
folder and send to Mr. Ejiro electronically

i. Outline the steps to put the two documents in a folder

ii. Outline the steps to encrypt the folder

iii. State the two ways Akomolede Samuel will take to send it to Mr. Ejiro

(NOTE PLEASE: For each way, you are to properly outline the steps. Thanks.)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy