0% found this document useful (1 vote)
3K views4 pages

2ND Term Examination DP SS2

The document is a test with 49 multiple choice questions about data processing, databases, computer hardware, and internet safety. It covers topics like the entity-relationship model, the relational model, SQL, operating systems, input/output devices, application software, and the functions of common computer components and internet concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
3K views4 pages

2ND Term Examination DP SS2

The document is a test with 49 multiple choice questions about data processing, databases, computer hardware, and internet safety. It covers topics like the entity-relationship model, the relational model, SQL, operating systems, input/output devices, application software, and the functions of common computer components and internet concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

SUBJECT: DATA PROCESSING CLASS: SS 2 TIME: 2HRS

Instruction: Answer all questions in section A

SECTION A

1. _______________ is an entity in the entity-relationship model? (a) A single occurrence of a table (b)
A column in a database table (c) A logical grouping of related data (d) A type of relationship between
tables

2. __________________ refers to a single occurrence of an entity? (a) Entity instance (b) Entity set (c)
Attribute (d) Relationship

3. What is an attribute in the entity-relationship model? (a) A column in a database table (b) A single
occurrence of an entity (c) A logical grouping of related data (d) A type of relationship between tables

4. What are the types of attributes in the entity-relationship model? (a) Primary and foreign (b) Integer
and float (c) Single-valued and multi-valued (d) Text and numeric

5. What is a relationship in the entity-relationship model? (a) A connection between two entities (b) A
single occurrence of an entity (c) A type of attribute (d) A logical grouping of related data

6. What does the degree of a relationship represent? (a) The number of attributes in an entity (b) The
number of entities participating in the relationship (c) The number of instances of an entity (d) The
number of tables in a database

7. The cardinality of a relationship indicates __________________? (a) The number of entities that can
be involved in the relationship (b) The data type of the relationship attribute (c) The primary key of
the relationship (d) The degree of the relationship

8. In the relational model, ______________ is a relation? (a) A connection between two tables (b) A
logical grouping of related data (c) A single occurrence of a database table (d) A type of attribute

9. What is an attribute in the relational model? (a) A single occurrence of a relation (b) A logical
grouping of related data (c) A column in a database table (d) A type of relationship between tables

10. What is a tuple in the relational model? (a) A single occurrence of a relation (b) A logical grouping of
related data (c) A connection between two relations (d) A type of attribute

11. What is a domain in the relational model? (a) A set of permissible values for an attribute (b) A
connection between two tuples (c) A logical grouping of related data (d) A type of relationship
between relations

12. What does the degree of a relation represent? (a) The number of attributes in a relation (b) The
number of tuples in a relation (c) The number of relations in a database (d) The number of instances
of a relation

13. ________ data modelling is the process of structuring and organizing data. (a) data model (b)
primary key (c) data modelling (d) relational model
14. The data model that describes how to organize data using a database management system is
__________ (a) data structure (b) data organization (c) data modelling (d) data model
15. ________ summaries and organizes data for viewing online and printing (a) forms (b) query (c)
report (d) table
16. The data type that stores up to 64000 is ___________ (a) text (b) auto-number (c) memo (d) number
17. _________ consists of a single, two dimensional array of data elements where all members of given
columns are assumed to have identical values and all members of the rows are assumed to be
related to one another. (a) relational model (b) flat (c) hierarchical (d) network
18. Which of the following is not a type of networking topology (a) Bus (b) Local (c) mesh (d) ring (e) star
19. Convert 110112 to base 10 (a) 17 (b) 27 (c) 31 (d) 37 (e) 41
20. The first stage of data processing is called ___________ (a) data collection (b) data summarization
(c) data analysis (d) data retrieval
21. Which of these is not among the categories of application specific software (a) accounting software
(c) database software (c) payroll programs (d) statistical packages (e) web design software
22. Which of the following is not a method of data collection (a) parsing (b) observation (c) interview (d)
questionnaire
23. How can you modify a relation using SQL? (a) Using the MODIFY statement (b) Using the UPDATE
statement (c) Using the ALTER TABLE statement (d) Using the DELETE statement

24. _______________________ is the purpose of the booting process in computing? (a) To shut down
the computer (b) To restart the computer (c) To load the operating system into memory (d) To install
new software updates

25. What are the types of relational keys commonly used in databases? (a) Primary, foreign, and
alternate (b) Integer, float, and string (c) Sequential, random, and indexed (d) Ascending,
descending, and random

26. What is the primary function of a web browser? (a) To access and view websites on the internet (b)
To create and edit documents (c) To store and manage files on a computer (d) To send and receive
emails

27. How do search engines help users find information online? (a) By indexing and organizing web
pages (b) By blocking access to certain websites (c) By providing free online games (d) By selling
products and services

28. What are some common internet safety practices? (a) Using strong and unique passwords (b)
Sharing personal information online (c) Clicking on suspicious links or pop-ups (d) Downloading files
from unknown sources

29. ______________ is an example of a system software? (a) Operating system (b) Word processor (c)
Spreadsheet software (d) Presentation software

30. ______________ file organization method arranges records in sequential order based on a key
field? (a) Sequential (b) Random (c) Indexed (d) Hashed

31. What is the purpose of the operating system in a computer? (a) To manage hardware resources and
provide user interfaces (b) To create and edit documents (c) To play games and watch videos (d) To
browse the internet and send emails

32. What is the main function of a printer as a computer peripheral? (a) To produce hard copies of digital
documents (b) To scan and digitize physical documents (c) To input data into the computer (d) To
store and retrieve data from memory

33. What is the role of a mouse in computer usage? (a) To navigate and interact with graphical user
interfaces (b) To type and input text into the computer (c) To display visual output on a monitor (d) To
provide audio output through speakers

34. What is the primary purpose of the keyboard as an input device? (a) To enter text and commands
into the computer (b) To display images and videos (c) To manipulate and edit digital documents (d)
To connect to the internet and browse websites

35. Which of these is an example of application software used for creating presentations? (a) Microsoft
PowerPoint (b) Microsoft Excel (c) Adobe Photoshop (d) Windows Media Player
36. How does a monitor function as a computer peripheral? (a) To display visual output from the
computer (b) To store and retrieve data from memory (c) To scan and digitize physical documents
(d) To produce hard copies of digital documents

37. What are some common types of relational keys used in database management? (a) Primary,
foreign, and alternate (b) Sequential, random, and indexed (c) Ascending, descending, and random
(d) Integer, float, and string

38. What is the significance of a primary key in a database table? (a) It uniquely identifies each record in
the table (b) It establishes relationships between tables (c) It sorts records in the table (d) It adds
new records to the table

39. What is the purpose of the ALTER TABLE statement in SQL? (a) To modify the structure of an
existing table (b) To insert new records into a table (c) To delete records from a table (d) To update
existing records in a table

40. How does the internet benefit users? (a) By providing access to a vast amount of information and
resources (b) By restricting access to certain websites (c) By encouraging unhealthy online
behaviors (d) By slowing down computer performance

41. What constitutes an abuse of the internet? (a) Cyberbullying and online harassment (b) Responsible
online behavior (c) Sharing knowledge and collaborating online (d) Following internet safety
guidelines

42. What is the function of a web browser in internet usage? (a) To access and view websites on the
internet (b) To manage hardware resources and provide user interfaces (c) To create and edit digital
documents (d) To play games and watch videos

43. What are some common internet safety practices? (a) Using strong and unique passwords (b)
Sharing personal information online (c) Clicking on suspicious links or pop-ups (d) Downloading files
from unknown sources

44. ____________ is an example of an application software used for creating spreadsheets? (a)
Microsoft Excel (b) Microsoft Word (c) Adobe Photoshop (d) Windows Media Player

45. What is the primary role of a printer as a computer peripheral? (a) To produce hard copies of digital
documents (b) To scan and digitize physical documents (c) To input data into the computer (d) To
store and retrieve data from memory

46. What is the primary purpose of the keyboard as an input device? (a) To enter text and commands
into the computer (b) To display images and videos (c) To manipulate and edit digital documents (d)
To connect to the internet and browse websites

47. What is an example of an application software used for creating presentations? (a) Microsoft
PowerPoint (b) Microsoft Excel (c) Adobe Photoshop (d) Windows Media Player

48. How does a monitor function as a computer peripheral? (a) To display visual output from the
computer (b) To store and retrieve data from memory (c) To scan and digitize physical documents
(d) To produce hard copies of digital documents

49. What is the significance of a primary key in a database table? (a) It uniquely identifies each record in
the table (b) It establishes relationships between tables (c) It sorts records in the table (d) It adds
new records to the table
50. What constitutes an abuse of the internet? (a) Cyberbullying and online harassment (b) Responsible
online behavior (c) Sharing knowledge and collaborating online (d) Following internet safety
guidelines

Theory Part

Attempt Four Questions Only

1. Write a short on each of the following terms:

i. Bus ii Address iii. Register iv Data v. Data conversion

2. Define the following terms:

i. Computer files ii. Record iii. Field iv. Worksheet v. Cell

3. (a) List three classes of computer files.

(b) List two types file organization methods

4. (a) Draw a sample of file structure.

(b) State the criteria for classifying computer files.

5. (a) Write out 5 basic operations that can be performed on computer files

(c) What is computer file insecurity?

6. (a) What is system development?

(b) Describe the following terms:

i. System analysis ii. System design iii. System analyst

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy