Data Processing SS 3 Mock Exams

DATA PROCESSING

1. Data models describe ……… data for storage in data management systems (a) structured (b) unstructured (c) integer (d) alphabetic

2. Which of this is not an example of standard data model (a) ISO 10303 (b) ISO 15926 (c) IDEAS GROUP d) Good shepherd

3 key is a field in a relational table that matches a primary key of another

table (a) foreign (b) surrogate (c) primary (d) candidate

4 is graphical representation of entities and their relationships to each

other (a) Entity-Relationship Diagram (b) Entity-Relationship Picture (c) Entity- Relationship Data (d) Entity-Relationship Symbol

5. A roof covers a building describes …………relationship (a) one-to-one (b) one-to- many (c) many-to-many(d) none of the above

1. ………. is a database table that has been reduced to certain fields.a) Table b) An index c) Table model d) Network model

2. The copy of an index is always in …… form. a) duplicate b) field c) sorted d) domain

3. The index can take place only if the data records are sorted on the search

key field. a)unclustered b)insert c) update d) clustered

4. A can contain several unclusterd indexes a) data file b) primary c) check

d) index

5. Index contain a value and a)pointer b) sign c) update d) model

1. ………. is an index in which the search k lọey contains some candidate key. a) Unique index b) An index c) composite d) sparse index

2. …… can be created on a non- key attribute. a) primary index b) dense index c) secondary index d) sparse index

3. A sparse index contains one entry for each ……of records in the data file. a) page

b) table c) row d) column

4 is the one in which not all fields in the Search key are bound to constant. a)

dense index b) composite search key c) secondary index d) range query

5 is when the search key for an index contain several fields. a) primary index b)

composite search key c) secondary index d) unique index Maintenance is necessary on computer to avoid ……….

a) hardware failure b) stealing c) invasion d) crime

2. Excess heat accelerates the deterioration of the delicate in the system. a)

vacuum b) transistors c) circuits d) particles

3. Dust and dirt are the most common cause of a) leakage b) overheating c)

breakage d) spooling.

4 is used to remove dust, dirt and hair from the keyboard. a) Vacuum cleaner

b) Brush c) Old rag d) Paper towels

5. It is advisable to wear an to reduce transferring static electricity from your

body to the computer. a) hand glove b) anti – static wrist strip c) coat d) dust

cover

1. Which of the following is not a software maintenance? a) Virus b) Spyware c) Hard disk d) Registry removal

2. The software maintenance that involves developing and deploying solutions to problems is a) corrective b) adaptive c) preventive d) perfective

3. The software maintenance that takes care of the changes that occur in software maintenance is called a) adaptive b) corrective c) perfective d) preventive

4. Disk cleaning should be done ……….. a) hourly b) daily c) weekly d) yearly

5. Patches and update are regularly released by software companies to tackle security problems found in a) programs b) hardware c) people ware d)

peripheral

1 is the practice of keeping data protected from corruption and

unauthorized access. (a) Data measurement (b) Data security (c) Data protection (d) Data control

2. Which of these is not a type of security control ……?(a) access control (b) auditing

(c) encryption(d) storage

3 security mechanism uses mathematical schemes and algorithm to

scramble data into unreadable text. (a) Encryption (b) Auditing (c) Authentication

(d) Auditing

4 is the process of copying and archiving data so it may be used to restore

original after a data loss (a) Backup (b) Restore (c) Control (d) Saving

5 is the computer professional responsible for the configuration,

administration and maintenance of a database (a) Programmer (b) System administrator (c) Database administrator (d) System analyst

1. The process by which a database is moved back to a consistent and usable state is called (a) cash recovery (b) crash recovery (c) past recovery (d) undo

recovery

2. The recovery algorithm that uses no-force and steals approach is …………..

(a) ARIAS (b) ARIES (c) ARREARS (d) ARIS

3. ARIES works in Phases (a) 3 (b) 2 (c) 1 (d) 4

4. Which of these is not a crash recovery type …………

(a) ARIES (b) Media recovery (c) Check pointing (d) UNDO

5 Crash recovery uses backup files (a) Check point (b) ARIES (c) Media

recovery

(d) Atomicity

THEORY

1. Discuss the concept of ARIES in crash recovery.

2. Explain the difference between media recovery and check point.

3. Explain the difference between a system crash and a media failure.

THEORY

1. Explain two types of data security control.

2. Mention five (5) duties of a database administrator.

THEORY

1. List and explain the four software maintenance.

2. State four benefits of software maintenance

3. State three routine computer maintenance

THEORY

1. Explain the steps in cleaning the following: i) Mouse ii) Keyboard iii Monitor iv) DVD drive lens

2. State six tools used in cleaning computer hardware.

THEORY

1. Create a student table with the following fields: name, age, and scores of 5 records. Create an index using a composite keys name and age. (show the table and SQL statements)

2. Discuss the different types of indexing.

3. Differentiate between a unique index and a range query.

4. What is composite search key?

THEORY

1. Differentiate between clustered index and unclustered index.

2. State two reasons why clustered index is expensive to maintain.

3. What is an index?

THEORY

1. (a) Define the following terms (i) Entity (ii) Attribute (iii) Relationship

(b) What is cardinality?

(c) Mention and explain three types of relationship in ERD with one example each

2. (a) Define the following (i) Primary key (ii) Foreign key (iii) Composite primary key

(b) Explain the term Normal Form.

(c) Design a database of your choice indicating the primary key and the foreign key