Data Processing SS 3 Mock Exams

DATA PROCESSING SS 3 SECOND TERM MOCK EXAMINATION

Table of Contents

PART A: Objective Questions (Fill-in-the-Blank with Options)

  1. Data models describe _____ data for storage in data management systems.
    a) Structured
    b) Unstructured
    c) Integer
    d) Alphabetic

  2. The key that matches a primary key in another table is called a _____ key.
    a) Foreign
    b) Surrogate
    c) Primary
    d) Candidate

  3. A graphical representation of entities and their relationships is called a(n) _____.
    a) Entity-Relationship Diagram
    b) Entity-Relationship Picture
    c) Entity-Relationship Data
    d) Entity-Relationship Symbol

  4. The relationship between a roof and a building is a _____ relationship.
    a) One-to-One
    b) One-to-Many
    c) Many-to-Many
    d) None of the above

  5. A database table that has been reduced to certain fields is called a _____.
    a) Table
    b) Index
    c) Table Model
    d) Network Model

  6. The copy of an index is always in _____ form.
    a) Duplicate
    b) Field
    c) Sorted
    d) Domain

  7. The index can take place only if the data records are sorted on the search key field. This is called a _____ index.
    a) Unclustered
    b) Insert
    c) Update
    d) Clustered

  8. A _____ can contain several unclustered indexes.
    a) Data File
    b) Primary
    c) Check
    d) Index

  9. An index contains a value and a _____.
    a) Pointer
    b) Sign
    c) Update
    d) Model

  10. A sparse index contains one entry for each _____ of records in the data file.
    a) Page
    b) Table
    c) Row
    d) Column

  11. The search key for an index that contains several fields is called a _____.
    a) Primary Index
    b) Composite Search Key
    c) Secondary Index
    d) Unique Index

  12. _____ is necessary for a computer to avoid hardware failure.
    a) Maintenance
    b) Stealing
    c) Invasion
    d) Crime

  13. Excess heat accelerates the deterioration of delicate components in a system, such as _____.
    a) Vacuum
    b) Transistors
    c) Circuits
    d) Particles

  14. Dust and dirt are the most common causes of _____.
    a) Leakage
    b) Overheating
    c) Breakage
    d) Spooling

  15. A _____ is used to remove dust, dirt, and hair from the keyboard.
    a) Vacuum Cleaner
    b) Brush
    c) Old Rag
    d) Paper Towels

  16. It is advisable to wear a(n) _____ to reduce static electricity transfer from your body to the computer.
    a) Hand Glove
    b) Anti-Static Wrist Strap
    c) Coat
    d) Dust Cover

  17. The software maintenance that involves developing and deploying solutions to problems is called _____.
    a) Corrective
    b) Adaptive
    c) Preventive
    d) Perfective

  18. The software maintenance that takes care of software changes is called _____.
    a) Adaptive
    b) Corrective
    c) Perfective
    d) Preventive

  19. Disk cleaning should be done _____.
    a) Hourly
    b) Daily
    c) Weekly
    d) Yearly

  20. Patches and updates are regularly released by software companies to tackle security problems found in _____.
    a) Programs
    b) Hardware
    c) Peopleware
    d) Peripheral

  21. The practice of keeping data protected from corruption and unauthorized access is called _____.
    a) Data Measurement
    b) Data Security
    c) Data Protection
    d) Data Control

  22. The security mechanism that uses mathematical schemes to scramble data into unreadable text is _____.
    a) Encryption
    b) Auditing
    c) Authentication
    d) Archiving

  23. The process of copying and archiving data to restore it after loss is called _____.
    a) Backup
    b) Restore
    c) Control
    d) Saving

  24. The computer professional responsible for configuring, administering, and maintaining a database is called a _____.
    a) Programmer
    b) System Administrator
    c) Database Administrator
    d) System Analyst

  25. The process by which a database is moved back to a consistent state is called _____.
    a) Cash Recovery
    b) Crash Recovery
    c) Past Recovery
    d) Undo Recovery

  26. The recovery algorithm that uses the no-force and steals approach is _____.
    a) ARIAS
    b) ARIES
    c) ARREARS
    d) ARIS

  27. How many phases does ARIES work in?
    a) 3
    b) 2
    c) 1
    d) 4

  28. Which of these is not a crash recovery type?
    a) ARIES
    b) Media Recovery
    c) Checkpointing
    d) UNDO

  29. Crash recovery uses backup files such as _____.
    a) Checkpoint
    b) ARIES
    c) Media Recovery
    d) Atomicity

  30. The primary key is used to uniquely identify records in a table, while the _____ key establishes relationships between tables.
    a) Foreign
    b) Composite
    c) Candidate
    d) Surrogate


PART B: Theory Questions (Evaluation Questions)

  1. Discuss the concept of ARIES in crash recovery.

  2. Explain the difference between media recovery and checkpoint.

  3. Differentiate between a system crash and a media failure.

  4. Explain two types of data security control with examples.

  5. Mention five (5) duties of a database administrator.

  6. List and explain the four types of software maintenance.

  7. State four benefits of software maintenance in computer systems.

  8. Mention three routine computer maintenance practices and their importance.

  9. Describe the steps in cleaning the following computer hardware:
    i) Mouse
    ii) Keyboard
    iii) Monitor
    iv) DVD Drive Lens

  10. Create an SQL statement to generate a student table with the following fields: name, age, and scores (5 records). Also, create an index using composite keys (name and age).

MULTIPLE CHOICE QUESTIONS & EXPLANATIONS

1. Data models describe ……… data for storage in data management systems

Answer: (a) structured
Explanation: Data models define how data is structured, stored, and retrieved in a database. Structured data is organized in a fixed format, such as tables in relational databases.


2. Which of these is not an example of a standard data model?

Answer: (d) Good Shepherd
Explanation: ISO 10303 and ISO 15926 are international standard models used in data representation. IDEAS GROUP is a known data model framework, but “Good Shepherd” is not related to data modeling.


3. A key that is a field in a relational table matching a primary key of another table is called …

Answer: (a) foreign
Explanation: A foreign key establishes a link between two tables, ensuring referential integrity in a relational database.


4. A graphical representation of entities and their relationships is called …

Answer: (a) Entity-Relationship Diagram (ERD)
Explanation: ERDs visually map out database structures by showing relationships between data entities.


5. “A roof covers a building” describes what relationship?

Answer: (b) one-to-many
Explanation: A building can have multiple roofs (e.g., different sections), but each roof belongs to only one building. This represents a one-to-many relationship.


6. A database table reduced to certain fields is called …

Answer: (b) An index
Explanation: An index optimizes database searches by reducing the dataset to key fields for quick lookup.


7. The copy of an index is always in … form

Answer: (c) sorted
Explanation: Indexes must be sorted for quick searching and efficient retrieval of data.


8. The index can take place only if the data records are sorted on the search key field.

Answer: (d) clustered
Explanation: Clustered indexes physically sort records based on the index key, unlike non-clustered indexes.


9. A data file can contain several … indexes

Answer: (d) index
Explanation: Multiple indexes can be created to improve search efficiency.


10. An index contains a value and a …

Answer: (a) pointer
Explanation: The index points to the location of the actual data in the table.


11. An index where the search key contains a candidate key is called …

Answer: (a) Unique index
Explanation: A unique index ensures that no duplicate values exist for the indexed column.


12. A … can be created on a non-key attribute.

Answer: (c) secondary index
Explanation: A secondary index helps optimize searches on non-primary key attributes.


13. A sparse index contains one entry for each … of records in the data file.

Answer: (a) page
Explanation: A sparse index doesn’t contain every row, only key pages, making lookups faster.


14. A composite search key is one where …

Answer: (b) not all fields in the search key are bound to constant
Explanation: A composite key consists of multiple fields, allowing more flexible queries.


15. A search key for an index that contains multiple fields is called a …

Answer: (b) composite search key
Explanation: Composite search keys allow complex queries by indexing multiple columns together.


16. Maintenance is necessary on computers to avoid …

Answer: (a) hardware failure
Explanation: Regular maintenance prevents hardware breakdowns and system crashes.


17. Excess heat accelerates the deterioration of … in the system.

Answer: (c) circuits
Explanation: Overheating damages sensitive circuits, reducing hardware lifespan.


18. Dust and dirt are the most common causes of …

Answer: (b) overheating
Explanation: Dust clogs vents, increasing system temperature and causing failures.


19. … is used to remove dust, dirt, and hair from the keyboard.

Answer: (a) Vacuum cleaner
Explanation: A vacuum cleaner safely removes debris from keyboards without damaging keys.


20. To reduce transferring static electricity to the computer, wear …

Answer: (b) anti-static wrist strap
Explanation: An anti-static wrist strap prevents damage to electronic components.


21. Which of the following is not software maintenance?

Answer: (c) Hard disk
Explanation: A hard disk is hardware, while maintenance focuses on software like virus protection.


22. The software maintenance that involves developing and deploying solutions to problems is …

Answer: (a) corrective
Explanation: Corrective maintenance fixes bugs and performance issues.


23. The software maintenance that handles changes in software environment is …

Answer: (a) adaptive
Explanation: Adaptive maintenance updates software to work with new hardware or OS versions.


24. Disk cleaning should be done …

Answer: (c) weekly
Explanation: Regular weekly cleaning prevents unnecessary clutter and improves system performance.


25. Patches and updates are released by software companies to tackle …

Answer: (a) security problems
Explanation: Software patches fix security vulnerabilities and improve performance.


26. The practice of keeping data protected from unauthorized access is called …

Answer: (b) Data security
Explanation: Data security includes encryption, access controls, and backups.


27. Which of these is NOT a type of security control?

Answer: (d) storage
Explanation: Storage is not a control mechanism, but access control, encryption, and auditing are.


28. Security mechanism that scrambles data into unreadable text is …

Answer: (a) Encryption
Explanation: Encryption transforms readable data into encoded text, preventing unauthorized access.


29. The process of copying and archiving data to restore in case of loss is …

Answer: (a) Backup
Explanation: Backups help recover lost or corrupted data.


30. The computer professional responsible for database management is …

Answer: (c) Database Administrator
Explanation: A DBA ensures database security, backup, and performance optimization.


PART B: THEORY QUESTIONS & EVALUATION

  1. Explain the ARIES crash recovery process.
  2. Differentiate between media recovery and check-pointing.
  3. Discuss two types of data security control.
  4. Mention five duties of a database administrator.
  5. List and explain four types of software maintenance.
  6. State four benefits of software maintenance.
  7. Outline steps for cleaning a mouse, keyboard, monitor, and DVD drive lens.
  8. State six tools used in cleaning computer hardware.
  9. Create a database table with indexes and SQL queries.
  10. Differentiate between a clustered and unclustered index.

PART B: THEORY QUESTIONS & DETAILED EXPLANATIONS


1. Explain the ARIES Crash Recovery Process.

ARIES (Algorithm for Recovery and Isolation Exploiting Semantics) is a database recovery method used to ensure data integrity after a system crash. It follows three key steps:

  1. Analysis Phase:

    • Identifies transactions that were active at the time of the crash.
    • Scans the log to determine the last checkpoint.
  2. Redo Phase:

    • Reapplies all committed transactions to bring the database to its pre-crash state.
    • Uses the log sequence number (LSN) to determine which updates need to be redone.
  3. Undo Phase:

    • Rolls back uncommitted transactions to maintain consistency.
    • Uses the log records to undo changes made by incomplete transactions.

2. Differentiate Between Media Recovery and Check-Pointing.

Feature Media Recovery Check-Pointing
Definition The process of restoring lost or corrupted data from backups. A mechanism used to save the current state of the database periodically.
Purpose Ensures data is recovered after disk failure. Reduces the amount of redo work needed after a crash.
Process Uses backups and archived logs to restore data. Saves system progress by writing all modified data to disk.
Example Restoring a database after a hard drive failure. Taking a snapshot of the database state every hour.

3. Discuss Two Types of Data Security Control.

  1. Access Control:

    • Restricts who can view or modify data.
    • Uses authentication methods like passwords, biometrics, or multi-factor authentication (MFA).
  2. Encryption:

    • Converts data into unreadable formats to prevent unauthorized access.
    • Uses cryptographic algorithms like AES and RSA.

4. Mention Five Duties of a Database Administrator (DBA).

  1. Database Maintenance: Regularly updates and optimizes database performance.
  2. Backup and Recovery: Ensures data is backed up and can be restored in case of failure.
  3. Security Management: Implements access controls and encryption to protect data.
  4. Performance Tuning: Optimizes queries and indexing for efficient data retrieval.
  5. User Management: Assigns roles and permissions to ensure authorized access to the database.

5. List and Explain Four Types of Software Maintenance.

  1. Corrective Maintenance:

    • Fixes software bugs and errors.
    • Example: Fixing a crashing issue in an application.
  2. Adaptive Maintenance:

    • Modifies software to work with new hardware or OS updates.
    • Example: Updating software to be compatible with Windows 11.
  3. Perfective Maintenance:

    • Improves software performance and adds new features.
    • Example: Adding a dark mode option to an app.
  4. Preventive Maintenance:

    • Reduces future failures by optimizing code and fixing potential vulnerabilities.
    • Example: Regular security patches to prevent hacking.

6. State Four Benefits of Software Maintenance.

  1. Increases Security: Regular updates protect against cyber threats.
  2. Enhances Performance: Bug fixes improve system efficiency.
  3. Ensures Compatibility: Keeps software functional with the latest technologies.
  4. Extends Software Lifespan: Prevents obsolescence by keeping software up-to-date.

7. Outline Steps for Cleaning a Mouse, Keyboard, Monitor, and DVD Drive Lens.

Mouse:

  1. Disconnect the mouse from the computer.
  2. Use a microfiber cloth with isopropyl alcohol to clean the surface.
  3. Remove dirt from the sensor using a cotton swab.

Keyboard:

  1. Turn off and unplug the keyboard.
  2. Shake out loose debris.
  3. Use compressed air to remove dust between keys.
  4. Wipe keys with a damp cloth.

Monitor:

  1. Turn off the screen.
  2. Use a microfiber cloth to wipe the screen gently.
  3. Avoid using ammonia-based cleaners.

DVD Drive Lens:

  1. Open the drive and remove the disc.
  2. Use a DVD lens cleaner disc or a cotton swab with isopropyl alcohol.
  3. Let it dry before closing the drive.

8. State Six Tools Used in Cleaning Computer Hardware.

  1. Compressed Air: Removes dust from keyboards and vents.
  2. Microfiber Cloth: Cleans screens and surfaces without scratching.
  3. Isopropyl Alcohol: Disinfects and removes grime.
  4. Anti-static Brush: Removes dust from circuit boards safely.
  5. Vacuum Cleaner: Cleans dust from keyboards and CPU fans.
  6. Cotton Swabs: Cleans small areas like ports and sensors.

9. Create a Database Table with Indexes and SQL Queries.

Creating a Table with an Index

sql
CREATE TABLE Students (
StudentID INT PRIMARY KEY,
FirstName VARCHAR(50),
LastName VARCHAR(50),
Age INT,
Course VARCHAR(100)
);

Creating an Index on the Course Column

sql
CREATE INDEX idx_course ON Students(Course);

Query to Retrieve Data Using the Index

sql
SELECT * FROM Students WHERE Course = 'Computer Science';

10. Differentiate Between a Clustered and Unclustered Index.

Feature Clustered Index Unclustered Index
Definition Stores data in the order of the index key. Maintains a separate index table, with pointers to actual data.
Storage The table itself is sorted based on the index. Data is stored separately from the index.
Performance Faster for range-based searches. Slower for large range queries.
Example Primary key index in a relational database. Secondary index on a non-primary key column.

Data

Share This :