0% found this document useful (0 votes)
18 views6 pages

Ss 3 Data Processing Mock Exam

The document is a mock exam for data processing consisting of 60 objective questions covering various computer-related topics, including hardware, software, networking, and data management. It also includes a section with four essay questions requiring detailed answers on specific computing concepts. The exam assesses knowledge of computer functions, programming languages, operating systems, and data processing cycles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views6 pages

Ss 3 Data Processing Mock Exam

The document is a mock exam for data processing consisting of 60 objective questions covering various computer-related topics, including hardware, software, networking, and data management. It also includes a section with four essay questions requiring detailed answers on specific computing concepts. The exam assesses knowledge of computer functions, programming languages, operating systems, and data processing cycles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

SS 3 DATA PROCESSING MOCK EXAM (60 Objective Questions)

INSTRUCTIONS: Answer all questions. Select the correct option (A, B, C, or D).

1. Which of the following is NOT a currently in use is called ____. A. Hard


function of a computer? A. Data disk
processing B. RAM
B. Data storage C. ROM
C. Manual computation D. Cache memory
D. Information retrieval
8. What does HTTP stand for? A. Hyper
2. The physical components of a computer Text Transmission Protocol
system are referred to as ____. A. B. Hyper Text Transfer Protocol
Software C. High Tech Text Processing
B. Hardware D. Hyperlink Transfer Protocol
C. Data
9. The process of starting up a computer is
D. Information
known as ____. A. Processing
3. Which of these storage devices is non- B. Booting
volatile? A. RAM C. Formatting
B. Cache memory D. Compiling
C. Hard disk
10. Which of these is an example of system
D. Registers
software? A. Windows
4. The full meaning of IPO as used in B. Microsoft Excel
computing is ____. A. Information C. CorelDRAW
Process Output D. VLC Media Player
B. Input Process Output
11. The full meaning of CPU is ____. A.
C. Internal Processing Operation
Central Processing Unit
D. Input Processing Optimization
B. Central Programming Unit
5. A set of programs that control the C. Control Processing Unit
operations of a computer is known as D. Computer Processing Utility
____. A. Hardware
12. A device that converts digital signals to
B. Software
analog and vice versa is called a ____.
C. Data
A. Router
D. Firmware
B. Modem
6. Which of the following is an example of C. Switch
an operating system? A. Microsoft Word D. Hub
B. Google Chrome
13. In a computer network, the device used
C. Linux
to connect multiple computers within a
D. Adobe Photoshop
LAN is called a ____. A. Repeater
7. The temporary storage area of a B. Hub
computer that holds data and programs
C. Gateway 21. The binary number system is composed
D. Firewall of ____. A. 0 and 1
B. 1 and 2
14. Which of the following is an example of
C. 0, 1, and 2
a spreadsheet software? A. MS Word
D. 2 and 3
B. MS Excel
C. MS PowerPoint 22. What does USB stand for? A. Universal
D. CorelDRAW Serial Bus
B. Uniform Service Bus
15. A computer virus is an example of ____.
C. Unified System Block
A. System software
D. User System Binary
B. Application software
C. Malware 23. A common programming language used
D. Hardware for web development is ____.

16. The process of copying files from a A. HTML


computer to a remote location via the B. COBOL
internet is called ____. A. Downloading C. FORTRAN
B. Uploading D. Assembly
C. Streaming 24. Which of the following is NOT an
D. Browsing example of an output device?
A. Monitor
17. Which of these is NOT a characteristic
B. Printer
of a good database? A. Integrity
C. Speaker
B. Security
D. Keyboard
C. Inconsistency
25. The primary function of an operating
D. Accuracy
system is to:
18. The brain of the computer is the ____. A. Edit documents
A. RAM B. Manage hardware and software
B. CPU resources
C. Hard disk C. Create spreadsheets
D. Monitor D. Browse the internet
26. The unit of measurement for processor
19. A set of related worksheets in a speed is:
spreadsheet program is called a ____. A. A. Hertz
Workbook B. Bytes
B. Worksheet C. Pixels
C. Cell D. Inches
D. Column 27. Which of the following is a
20. The fastest type of memory in a programming language?
computer is ____. A. RAM A. Google Chrome
B. Cache memory B. Python
C. Hard disk C. Windows
D. Floppy disk D. USB
28. A computer network that spans a large
geographical area is called a:
A. LAN B. Access and store data over the
B. WAN internet
C. MAN C. Remove viruses from a computer
D. PAN D. Connect computers to a local area
29. The permanent memory of a computer is network
called: 36. Which of the following storage devices
A. RAM is portable and rewritable?
B. ROM A. Hard disk drive
C. Cache memory B. Flash drive
D. Virtual memory C. ROM
30. The term “GIGO” in computing stands D. RAM
for: 37. A database management system
A. Garbage in, garbage out (DBMS) is used for:
B. Good input, good output A. Browsing the internet
C. General input, general output B. Managing and organizing data
D. Graphical interface, graphical output C. Designing graphics
31. Which key combination is used to undo D. Typing documents
an action in most applications? 38. Which of these programming languages
A. Ctrl + S is used for mobile app development?
B. Ctrl + X A. Java
C. Ctrl + Z B. COBOL
D. Ctrl + P C. Pascal
32. Which of the following is NOT a web D. SQL
browser? 39. The shortcut to save a document in most
A. Mozilla Firefox applications is:
B. Microsoft Edge A. Ctrl + P
C. Photoshop B. Ctrl + S
D. Google Chrome C. Ctrl + X
33. A malicious software that spreads from D. Ctrl + A
computer to computer is called a: 40. What does IP in IP address stand for?
A. Firewall A. Internet Protocol
B. Virus B. Internal Processing
C. Router C. Interconnected Pages
D. Compiler D. Information Provider
34. The device that protects a computer 41. A software that allows users to view and
network from unauthorized access is interact with websites is called a:
called a: A. Web server
A. Switch B. Web browser
B. Hub C. Web page
C. Firewall D. Web link
D. Server 42. The process of converting high-level
35. What is the main purpose of cloud programming code into machine
computing? language is called:
A. Store data locally A. Debugging
B. Compilation C. Global Uniform Internet
C. Execution D. Google Universal Information
D. Formatting 50. The term “booting” refers to:
43. What is the function of an antivirus A. Shutting down a computer
program? B. Installing software
A. Create documents C. Starting up a computer
B. Play music D. Scanning a document
C. Protect a computer from malware 51. Which of the following is NOT a type of
D. Design websites network topology?
44. The combination of two or more keys to A. Star
perform a task is called: B. Bus
A. Shortcut key C. Circle
B. Control key D. Ring
C. Function key 52. The software used to create documents
D. Arrow key and letters is called:
45. In Excel, a cell reference that remains A. Spreadsheet software
constant when copied is called a: B. Word processing software
A. Relative reference C. Database software
B. Absolute reference D. Web browser
C. Mixed reference 53. The process of keeping duplicate copies
D. Dynamic reference of data for safety purposes is known as:
46. Which of these is NOT an example of A. Encryption
an input device? B. Formatting
A. Keyboard C. Backup
B. Mouse D. Decryption
C. Scanner 54. The standard coding system used to
D. Speaker represent characters in computers is:
47. The primary function of a router in a A. ASCII
network is to: B. USB
A. Store data C. HTML
B. Connect different networks D. IP
C. Manage power supply 55. What does VPN stand for?
D. Prevent hacking A. Virtual Private Network
48. A type of malicious software that locks B. Very Personal Network
users out of their files until a ransom is C. Verified Public Network
paid is called: D. Visual Processing Node
A. Spyware 56. Which type of computer is most
B. Ransomware commonly used for personal tasks?
C. Adware A. Supercomputer
D. Trojan B. Mainframe computer
49. What does GUI stand for? C. Personal computer
A. General User Instruction D. Embedded computer
B. Graphical User Interface 57. Which file format is used for images?
A. .docx
B. .exe A. Hacking
C. .jpg B. Firewalling
D. .xls C. Authorization
58. Which of these is NOT an example of a D. Cybercrime
search engine? 60. The component responsible for
A. Google executing instructions in a computer is
B. Bing the:
C. Yahoo A. Monitor
D. WhatsApp B. CPU
59. The process of restricting access to C. Keyboard
certain parts of a network is called: D. Printer

PAPER II
Answer four questions only.

1. (a) (i) State two functions of the spell checker feature in Microsoft Word. (2 marks)
(ii) List four features of a word processor. (2 marks)
(iii) Differentiate between cut and copy in word processing. (2 marks)

(b) (i) State four types of keys in a database system. (2 marks)


(ii) Outline two uses of a spreadsheet in database management. (2 marks)

2. (a) (i) List two types of communication channels in telecommunication


and explain one of them. (4 marks)
(ii) State four examples of transmission media. (2 marks)

(b) (i) What is Word Processing? (2 marks)


(ii) List two examples of Word Processors. (2 marks)
(iii) Mention two methods of saving a document in MS-Word. (2 marks)

3. (a) (i) Mention two programming platforms used in front-end web design. (2 marks)
(ii) Explain three HTML tags used in web design. (3 marks)

(b) (i) List four functional stages of data processing cycle (2 marks)
(ii) Explain any two mentioned in 3b (i) above (4 marks)

4. (a) (i) Define graphics package (2 marks)


(ii) List two types of graphics package (1 mark)
(iii) Mention two features of graphics package (I mark)

(b) Briefly explain the following:


(i) First Normal Form (1NF) (2 marks)
(ii) Second Normal Form (2NF) (2 marks)
(iii) Third Normal Form (3NF) (2 marks)

5. (a) (i) Enumerate four types of operating systems. (2 marks)


(ii) Explain two scheduling strategies of an operating system. (4 marks)

(b) (i) What is data modelling? (2 marks)


(ii) List four data modelling approaches. (2 marks)

6. (a) (i) List four methods of transmitting information. (2 marks)


(ii) Explain two methods listed in 5(c) above. (2 marks)

(b) (i). What is the acronym ARIES in crash recovery? (1 mark)


(ii). State two principles of ARIES. (1 mark)
(iii.) Explain two phases of crash recovery. (4 marks)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy