Data Processing SS 3 Mock Exams
DATA PROCESSING SS 3 SECOND TERM MOCK EXAMINATION
Table of Contents
TogglePART A: Objective Questions (Fill-in-the-Blank with Options)
-
Data models describe _____ data for storage in data management systems.
a) Structured
b) Unstructured
c) Integer
d) Alphabetic -
The key that matches a primary key in another table is called a _____ key.
a) Foreign
b) Surrogate
c) Primary
d) Candidate -
A graphical representation of entities and their relationships is called a(n) _____.
a) Entity-Relationship Diagram
b) Entity-Relationship Picture
c) Entity-Relationship Data
d) Entity-Relationship Symbol -
The relationship between a roof and a building is a _____ relationship.
a) One-to-One
b) One-to-Many
c) Many-to-Many
d) None of the above -
A database table that has been reduced to certain fields is called a _____.
a) Table
b) Index
c) Table Model
d) Network Model -
The copy of an index is always in _____ form.
a) Duplicate
b) Field
c) Sorted
d) Domain -
The index can take place only if the data records are sorted on the search key field. This is called a _____ index.
a) Unclustered
b) Insert
c) Update
d) Clustered -
A _____ can contain several unclustered indexes.
a) Data File
b) Primary
c) Check
d) Index -
An index contains a value and a _____.
a) Pointer
b) Sign
c) Update
d) Model -
A sparse index contains one entry for each _____ of records in the data file.
a) Page
b) Table
c) Row
d) Column -
The search key for an index that contains several fields is called a _____.
a) Primary Index
b) Composite Search Key
c) Secondary Index
d) Unique Index -
_____ is necessary for a computer to avoid hardware failure.
a) Maintenance
b) Stealing
c) Invasion
d) Crime -
Excess heat accelerates the deterioration of delicate components in a system, such as _____.
a) Vacuum
b) Transistors
c) Circuits
d) Particles -
Dust and dirt are the most common causes of _____.
a) Leakage
b) Overheating
c) Breakage
d) Spooling -
A _____ is used to remove dust, dirt, and hair from the keyboard.
a) Vacuum Cleaner
b) Brush
c) Old Rag
d) Paper Towels -
It is advisable to wear a(n) _____ to reduce static electricity transfer from your body to the computer.
a) Hand Glove
b) Anti-Static Wrist Strap
c) Coat
d) Dust Cover -
The software maintenance that involves developing and deploying solutions to problems is called _____.
a) Corrective
b) Adaptive
c) Preventive
d) Perfective -
The software maintenance that takes care of software changes is called _____.
a) Adaptive
b) Corrective
c) Perfective
d) Preventive -
Disk cleaning should be done _____.
a) Hourly
b) Daily
c) Weekly
d) Yearly -
Patches and updates are regularly released by software companies to tackle security problems found in _____.
a) Programs
b) Hardware
c) Peopleware
d) Peripheral -
The practice of keeping data protected from corruption and unauthorized access is called _____.
a) Data Measurement
b) Data Security
c) Data Protection
d) Data Control -
The security mechanism that uses mathematical schemes to scramble data into unreadable text is _____.
a) Encryption
b) Auditing
c) Authentication
d) Archiving -
The process of copying and archiving data to restore it after loss is called _____.
a) Backup
b) Restore
c) Control
d) Saving -
The computer professional responsible for configuring, administering, and maintaining a database is called a _____.
a) Programmer
b) System Administrator
c) Database Administrator
d) System Analyst -
The process by which a database is moved back to a consistent state is called _____.
a) Cash Recovery
b) Crash Recovery
c) Past Recovery
d) Undo Recovery -
The recovery algorithm that uses the no-force and steals approach is _____.
a) ARIAS
b) ARIES
c) ARREARS
d) ARIS -
How many phases does ARIES work in?
a) 3
b) 2
c) 1
d) 4 -
Which of these is not a crash recovery type?
a) ARIES
b) Media Recovery
c) Checkpointing
d) UNDO -
Crash recovery uses backup files such as _____.
a) Checkpoint
b) ARIES
c) Media Recovery
d) Atomicity -
The primary key is used to uniquely identify records in a table, while the _____ key establishes relationships between tables.
a) Foreign
b) Composite
c) Candidate
d) Surrogate
PART B: Theory Questions (Evaluation Questions)
-
Discuss the concept of ARIES in crash recovery.
-
Explain the difference between media recovery and checkpoint.
-
Differentiate between a system crash and a media failure.
-
Explain two types of data security control with examples.
-
Mention five (5) duties of a database administrator.
-
List and explain the four types of software maintenance.
-
State four benefits of software maintenance in computer systems.
-
Mention three routine computer maintenance practices and their importance.
-
Describe the steps in cleaning the following computer hardware:
i) Mouse
ii) Keyboard
iii) Monitor
iv) DVD Drive Lens -
Create an SQL statement to generate a student table with the following fields: name, age, and scores (5 records). Also, create an index using composite keys (name and age).
MULTIPLE CHOICE QUESTIONS & EXPLANATIONS
1. Data models describe ……… data for storage in data management systems
Answer: (a) structured
Explanation: Data models define how data is structured, stored, and retrieved in a database. Structured data is organized in a fixed format, such as tables in relational databases.
2. Which of these is not an example of a standard data model?
Answer: (d) Good Shepherd
Explanation: ISO 10303 and ISO 15926 are international standard models used in data representation. IDEAS GROUP is a known data model framework, but “Good Shepherd” is not related to data modeling.
3. A key that is a field in a relational table matching a primary key of another table is called …
Answer: (a) foreign
Explanation: A foreign key establishes a link between two tables, ensuring referential integrity in a relational database.
4. A graphical representation of entities and their relationships is called …
Answer: (a) Entity-Relationship Diagram (ERD)
Explanation: ERDs visually map out database structures by showing relationships between data entities.
5. “A roof covers a building” describes what relationship?
Answer: (b) one-to-many
Explanation: A building can have multiple roofs (e.g., different sections), but each roof belongs to only one building. This represents a one-to-many relationship.
6. A database table reduced to certain fields is called …
Answer: (b) An index
Explanation: An index optimizes database searches by reducing the dataset to key fields for quick lookup.
7. The copy of an index is always in … form
Answer: (c) sorted
Explanation: Indexes must be sorted for quick searching and efficient retrieval of data.
8. The index can take place only if the data records are sorted on the search key field.
Answer: (d) clustered
Explanation: Clustered indexes physically sort records based on the index key, unlike non-clustered indexes.
9. A data file can contain several … indexes
Answer: (d) index
Explanation: Multiple indexes can be created to improve search efficiency.
10. An index contains a value and a …
Answer: (a) pointer
Explanation: The index points to the location of the actual data in the table.
11. An index where the search key contains a candidate key is called …
Answer: (a) Unique index
Explanation: A unique index ensures that no duplicate values exist for the indexed column.
12. A … can be created on a non-key attribute.
Answer: (c) secondary index
Explanation: A secondary index helps optimize searches on non-primary key attributes.
13. A sparse index contains one entry for each … of records in the data file.
Answer: (a) page
Explanation: A sparse index doesn’t contain every row, only key pages, making lookups faster.
14. A composite search key is one where …
Answer: (b) not all fields in the search key are bound to constant
Explanation: A composite key consists of multiple fields, allowing more flexible queries.
15. A search key for an index that contains multiple fields is called a …
Answer: (b) composite search key
Explanation: Composite search keys allow complex queries by indexing multiple columns together.
16. Maintenance is necessary on computers to avoid …
Answer: (a) hardware failure
Explanation: Regular maintenance prevents hardware breakdowns and system crashes.
17. Excess heat accelerates the deterioration of … in the system.
Answer: (c) circuits
Explanation: Overheating damages sensitive circuits, reducing hardware lifespan.
18. Dust and dirt are the most common causes of …
Answer: (b) overheating
Explanation: Dust clogs vents, increasing system temperature and causing failures.
19. … is used to remove dust, dirt, and hair from the keyboard.
Answer: (a) Vacuum cleaner
Explanation: A vacuum cleaner safely removes debris from keyboards without damaging keys.
20. To reduce transferring static electricity to the computer, wear …
Answer: (b) anti-static wrist strap
Explanation: An anti-static wrist strap prevents damage to electronic components.
21. Which of the following is not software maintenance?
Answer: (c) Hard disk
Explanation: A hard disk is hardware, while maintenance focuses on software like virus protection.
22. The software maintenance that involves developing and deploying solutions to problems is …
Answer: (a) corrective
Explanation: Corrective maintenance fixes bugs and performance issues.
23. The software maintenance that handles changes in software environment is …
Answer: (a) adaptive
Explanation: Adaptive maintenance updates software to work with new hardware or OS versions.
24. Disk cleaning should be done …
Answer: (c) weekly
Explanation: Regular weekly cleaning prevents unnecessary clutter and improves system performance.
25. Patches and updates are released by software companies to tackle …
Answer: (a) security problems
Explanation: Software patches fix security vulnerabilities and improve performance.
26. The practice of keeping data protected from unauthorized access is called …
Answer: (b) Data security
Explanation: Data security includes encryption, access controls, and backups.
27. Which of these is NOT a type of security control?
Answer: (d) storage
Explanation: Storage is not a control mechanism, but access control, encryption, and auditing are.
28. Security mechanism that scrambles data into unreadable text is …
Answer: (a) Encryption
Explanation: Encryption transforms readable data into encoded text, preventing unauthorized access.
29. The process of copying and archiving data to restore in case of loss is …
Answer: (a) Backup
Explanation: Backups help recover lost or corrupted data.
30. The computer professional responsible for database management is …
Answer: (c) Database Administrator
Explanation: A DBA ensures database security, backup, and performance optimization.
PART B: THEORY QUESTIONS & EVALUATION
- Explain the ARIES crash recovery process.
- Differentiate between media recovery and check-pointing.
- Discuss two types of data security control.
- Mention five duties of a database administrator.
- List and explain four types of software maintenance.
- State four benefits of software maintenance.
- Outline steps for cleaning a mouse, keyboard, monitor, and DVD drive lens.
- State six tools used in cleaning computer hardware.
- Create a database table with indexes and SQL queries.
- Differentiate between a clustered and unclustered index.
PART B: THEORY QUESTIONS & DETAILED EXPLANATIONS
1. Explain the ARIES Crash Recovery Process.
ARIES (Algorithm for Recovery and Isolation Exploiting Semantics) is a database recovery method used to ensure data integrity after a system crash. It follows three key steps:
-
Analysis Phase:
- Identifies transactions that were active at the time of the crash.
- Scans the log to determine the last checkpoint.
-
Redo Phase:
- Reapplies all committed transactions to bring the database to its pre-crash state.
- Uses the log sequence number (LSN) to determine which updates need to be redone.
-
Undo Phase:
- Rolls back uncommitted transactions to maintain consistency.
- Uses the log records to undo changes made by incomplete transactions.
2. Differentiate Between Media Recovery and Check-Pointing.
Feature | Media Recovery | Check-Pointing |
---|---|---|
Definition | The process of restoring lost or corrupted data from backups. | A mechanism used to save the current state of the database periodically. |
Purpose | Ensures data is recovered after disk failure. | Reduces the amount of redo work needed after a crash. |
Process | Uses backups and archived logs to restore data. | Saves system progress by writing all modified data to disk. |
Example | Restoring a database after a hard drive failure. | Taking a snapshot of the database state every hour. |
3. Discuss Two Types of Data Security Control.
-
Access Control:
- Restricts who can view or modify data.
- Uses authentication methods like passwords, biometrics, or multi-factor authentication (MFA).
-
Encryption:
- Converts data into unreadable formats to prevent unauthorized access.
- Uses cryptographic algorithms like AES and RSA.
4. Mention Five Duties of a Database Administrator (DBA).
- Database Maintenance: Regularly updates and optimizes database performance.
- Backup and Recovery: Ensures data is backed up and can be restored in case of failure.
- Security Management: Implements access controls and encryption to protect data.
- Performance Tuning: Optimizes queries and indexing for efficient data retrieval.
- User Management: Assigns roles and permissions to ensure authorized access to the database.
5. List and Explain Four Types of Software Maintenance.
-
Corrective Maintenance:
- Fixes software bugs and errors.
- Example: Fixing a crashing issue in an application.
-
Adaptive Maintenance:
- Modifies software to work with new hardware or OS updates.
- Example: Updating software to be compatible with Windows 11.
-
Perfective Maintenance:
- Improves software performance and adds new features.
- Example: Adding a dark mode option to an app.
-
Preventive Maintenance:
- Reduces future failures by optimizing code and fixing potential vulnerabilities.
- Example: Regular security patches to prevent hacking.
6. State Four Benefits of Software Maintenance.
- Increases Security: Regular updates protect against cyber threats.
- Enhances Performance: Bug fixes improve system efficiency.
- Ensures Compatibility: Keeps software functional with the latest technologies.
- Extends Software Lifespan: Prevents obsolescence by keeping software up-to-date.
7. Outline Steps for Cleaning a Mouse, Keyboard, Monitor, and DVD Drive Lens.
Mouse:
- Disconnect the mouse from the computer.
- Use a microfiber cloth with isopropyl alcohol to clean the surface.
- Remove dirt from the sensor using a cotton swab.
Keyboard:
- Turn off and unplug the keyboard.
- Shake out loose debris.
- Use compressed air to remove dust between keys.
- Wipe keys with a damp cloth.
Monitor:
- Turn off the screen.
- Use a microfiber cloth to wipe the screen gently.
- Avoid using ammonia-based cleaners.
DVD Drive Lens:
- Open the drive and remove the disc.
- Use a DVD lens cleaner disc or a cotton swab with isopropyl alcohol.
- Let it dry before closing the drive.
8. State Six Tools Used in Cleaning Computer Hardware.
- Compressed Air: Removes dust from keyboards and vents.
- Microfiber Cloth: Cleans screens and surfaces without scratching.
- Isopropyl Alcohol: Disinfects and removes grime.
- Anti-static Brush: Removes dust from circuit boards safely.
- Vacuum Cleaner: Cleans dust from keyboards and CPU fans.
- Cotton Swabs: Cleans small areas like ports and sensors.
9. Create a Database Table with Indexes and SQL Queries.
Creating a Table with an Index
CREATE TABLE Students (
StudentID INT PRIMARY KEY,
FirstName VARCHAR(50),
LastName VARCHAR(50),
Age INT,
Course VARCHAR(100)
);
Creating an Index on the Course Column
CREATE INDEX idx_course ON Students(Course);
Query to Retrieve Data Using the Index
SELECT * FROM Students WHERE Course = 'Computer Science';
10. Differentiate Between a Clustered and Unclustered Index.
Feature | Clustered Index | Unclustered Index |
---|---|---|
Definition | Stores data in the order of the index key. | Maintains a separate index table, with pointers to actual data. |
Storage | The table itself is sorted based on the index. | Data is stored separately from the index. |
Performance | Faster for range-based searches. | Slower for large range queries. |
Example | Primary key index in a relational database. | Secondary index on a non-primary key column. |
Related
Related posts:
- Ss3 Geography Exam Questions 2nd Term
- Ss 3 Financial Accounting Exams 3rd term
- Mock Exams SS 3 Economics
- Exam Questions Second Term SS 3 Marketing
- Mock Exams SS 3 Agricultural Science
- Mock Exams SS 3 Commerce
- Mock Exams SS 3 Physics
- Mock Exams SS 3 Literature English
- ALKANOIC ACID
- METALS AND THEIR COMPOUNDS RELATIVE ABUNDANCE AND CHEMICAL CHARACTERISTICS OF METALS,
Related Posts
Past Questions Agricultural Science Business Studies
Agricultural Science SS 3 First Term Lesson Plan and Scheme of Work
OSE KIN-IN-NI ORO – ISE
About The Author
Edu Delight Tutors
Am a dedicated educator with a passion for learning and a keen interest in technology. I believe that technology can revolutionize education and am committed to creating an online hub of knowledge, inspiration, and growth for both educators and students. Welcome to Edu Delight Tutors, where learning knows no boundaries.