2ND Term Examination DP SS2
2ND Term Examination DP SS2
SECTION A
1. _______________ is an entity in the entity-relationship model? (a) A single occurrence of a table (b)
A column in a database table (c) A logical grouping of related data (d) A type of relationship between
tables
2. __________________ refers to a single occurrence of an entity? (a) Entity instance (b) Entity set (c)
Attribute (d) Relationship
3. What is an attribute in the entity-relationship model? (a) A column in a database table (b) A single
occurrence of an entity (c) A logical grouping of related data (d) A type of relationship between tables
4. What are the types of attributes in the entity-relationship model? (a) Primary and foreign (b) Integer
and float (c) Single-valued and multi-valued (d) Text and numeric
5. What is a relationship in the entity-relationship model? (a) A connection between two entities (b) A
single occurrence of an entity (c) A type of attribute (d) A logical grouping of related data
6. What does the degree of a relationship represent? (a) The number of attributes in an entity (b) The
number of entities participating in the relationship (c) The number of instances of an entity (d) The
number of tables in a database
7. The cardinality of a relationship indicates __________________? (a) The number of entities that can
be involved in the relationship (b) The data type of the relationship attribute (c) The primary key of
the relationship (d) The degree of the relationship
8. In the relational model, ______________ is a relation? (a) A connection between two tables (b) A
logical grouping of related data (c) A single occurrence of a database table (d) A type of attribute
9. What is an attribute in the relational model? (a) A single occurrence of a relation (b) A logical
grouping of related data (c) A column in a database table (d) A type of relationship between tables
10. What is a tuple in the relational model? (a) A single occurrence of a relation (b) A logical grouping of
related data (c) A connection between two relations (d) A type of attribute
11. What is a domain in the relational model? (a) A set of permissible values for an attribute (b) A
connection between two tuples (c) A logical grouping of related data (d) A type of relationship
between relations
12. What does the degree of a relation represent? (a) The number of attributes in a relation (b) The
number of tuples in a relation (c) The number of relations in a database (d) The number of instances
of a relation
13. ________ data modelling is the process of structuring and organizing data. (a) data model (b)
primary key (c) data modelling (d) relational model
14. The data model that describes how to organize data using a database management system is
__________ (a) data structure (b) data organization (c) data modelling (d) data model
15. ________ summaries and organizes data for viewing online and printing (a) forms (b) query (c)
report (d) table
16. The data type that stores up to 64000 is ___________ (a) text (b) auto-number (c) memo (d) number
17. _________ consists of a single, two dimensional array of data elements where all members of given
columns are assumed to have identical values and all members of the rows are assumed to be
related to one another. (a) relational model (b) flat (c) hierarchical (d) network
18. Which of the following is not a type of networking topology (a) Bus (b) Local (c) mesh (d) ring (e) star
19. Convert 110112 to base 10 (a) 17 (b) 27 (c) 31 (d) 37 (e) 41
20. The first stage of data processing is called ___________ (a) data collection (b) data summarization
(c) data analysis (d) data retrieval
21. Which of these is not among the categories of application specific software (a) accounting software
(c) database software (c) payroll programs (d) statistical packages (e) web design software
22. Which of the following is not a method of data collection (a) parsing (b) observation (c) interview (d)
questionnaire
23. How can you modify a relation using SQL? (a) Using the MODIFY statement (b) Using the UPDATE
statement (c) Using the ALTER TABLE statement (d) Using the DELETE statement
24. _______________________ is the purpose of the booting process in computing? (a) To shut down
the computer (b) To restart the computer (c) To load the operating system into memory (d) To install
new software updates
25. What are the types of relational keys commonly used in databases? (a) Primary, foreign, and
alternate (b) Integer, float, and string (c) Sequential, random, and indexed (d) Ascending,
descending, and random
26. What is the primary function of a web browser? (a) To access and view websites on the internet (b)
To create and edit documents (c) To store and manage files on a computer (d) To send and receive
emails
27. How do search engines help users find information online? (a) By indexing and organizing web
pages (b) By blocking access to certain websites (c) By providing free online games (d) By selling
products and services
28. What are some common internet safety practices? (a) Using strong and unique passwords (b)
Sharing personal information online (c) Clicking on suspicious links or pop-ups (d) Downloading files
from unknown sources
29. ______________ is an example of a system software? (a) Operating system (b) Word processor (c)
Spreadsheet software (d) Presentation software
30. ______________ file organization method arranges records in sequential order based on a key
field? (a) Sequential (b) Random (c) Indexed (d) Hashed
31. What is the purpose of the operating system in a computer? (a) To manage hardware resources and
provide user interfaces (b) To create and edit documents (c) To play games and watch videos (d) To
browse the internet and send emails
32. What is the main function of a printer as a computer peripheral? (a) To produce hard copies of digital
documents (b) To scan and digitize physical documents (c) To input data into the computer (d) To
store and retrieve data from memory
33. What is the role of a mouse in computer usage? (a) To navigate and interact with graphical user
interfaces (b) To type and input text into the computer (c) To display visual output on a monitor (d) To
provide audio output through speakers
34. What is the primary purpose of the keyboard as an input device? (a) To enter text and commands
into the computer (b) To display images and videos (c) To manipulate and edit digital documents (d)
To connect to the internet and browse websites
35. Which of these is an example of application software used for creating presentations? (a) Microsoft
PowerPoint (b) Microsoft Excel (c) Adobe Photoshop (d) Windows Media Player
36. How does a monitor function as a computer peripheral? (a) To display visual output from the
computer (b) To store and retrieve data from memory (c) To scan and digitize physical documents
(d) To produce hard copies of digital documents
37. What are some common types of relational keys used in database management? (a) Primary,
foreign, and alternate (b) Sequential, random, and indexed (c) Ascending, descending, and random
(d) Integer, float, and string
38. What is the significance of a primary key in a database table? (a) It uniquely identifies each record in
the table (b) It establishes relationships between tables (c) It sorts records in the table (d) It adds
new records to the table
39. What is the purpose of the ALTER TABLE statement in SQL? (a) To modify the structure of an
existing table (b) To insert new records into a table (c) To delete records from a table (d) To update
existing records in a table
40. How does the internet benefit users? (a) By providing access to a vast amount of information and
resources (b) By restricting access to certain websites (c) By encouraging unhealthy online
behaviors (d) By slowing down computer performance
41. What constitutes an abuse of the internet? (a) Cyberbullying and online harassment (b) Responsible
online behavior (c) Sharing knowledge and collaborating online (d) Following internet safety
guidelines
42. What is the function of a web browser in internet usage? (a) To access and view websites on the
internet (b) To manage hardware resources and provide user interfaces (c) To create and edit digital
documents (d) To play games and watch videos
43. What are some common internet safety practices? (a) Using strong and unique passwords (b)
Sharing personal information online (c) Clicking on suspicious links or pop-ups (d) Downloading files
from unknown sources
44. ____________ is an example of an application software used for creating spreadsheets? (a)
Microsoft Excel (b) Microsoft Word (c) Adobe Photoshop (d) Windows Media Player
45. What is the primary role of a printer as a computer peripheral? (a) To produce hard copies of digital
documents (b) To scan and digitize physical documents (c) To input data into the computer (d) To
store and retrieve data from memory
46. What is the primary purpose of the keyboard as an input device? (a) To enter text and commands
into the computer (b) To display images and videos (c) To manipulate and edit digital documents (d)
To connect to the internet and browse websites
47. What is an example of an application software used for creating presentations? (a) Microsoft
PowerPoint (b) Microsoft Excel (c) Adobe Photoshop (d) Windows Media Player
48. How does a monitor function as a computer peripheral? (a) To display visual output from the
computer (b) To store and retrieve data from memory (c) To scan and digitize physical documents
(d) To produce hard copies of digital documents
49. What is the significance of a primary key in a database table? (a) It uniquely identifies each record in
the table (b) It establishes relationships between tables (c) It sorts records in the table (d) It adds
new records to the table
50. What constitutes an abuse of the internet? (a) Cyberbullying and online harassment (b) Responsible
online behavior (c) Sharing knowledge and collaborating online (d) Following internet safety
guidelines
Theory Part
5. (a) Write out 5 basic operations that can be performed on computer files