2nd Term Exam Q SS2 Data Processing
2nd Term Exam Q SS2 Data Processing
1. Revision
2. Relational Model 1
3. Relational Model 2
4. Relational Model 3
5. Database Security
6. Mid Term Break
7. File Organization 1
8. File Organization 2
9. Presentation Packages
10. Presentation Packages
11.Revision
12.Examination
ACADEMIC WEEK 4
DATABASE SECURITY
1. What is database security (a) data encryption (b) a view (c) finger print (d) all
of the above
2. Data security treats include (a) privacy invasion (b) hardware protection (c)
fraudulent manipulation of data (d) all of the above
3. ________ is responsible for making sure that the database remains in a
consistent state despite system failure (a) storage manager (b) transaction
manager (c) end user (d) sophisticated
4. Data integrity means (a) providing first access to stored (b) ensuring correctness
and consistency of data (c) providing data sharing (d) none of the above
5. Prevention of access to the database by unauthorized users is referred to as (a)
integrity (b) productivity (c) security (d) reliability
6. Authentication refers to (a) method of restricting user access to system (b)
controlling access to portion of database (c) controlling the operations on the
data (d) all of the above
https://www.gkseries.com/database-management-system/database-security-and-
integrity/database-security-and-integrity-multiple-choice-questions-and-
answers#first
7. Which of the following does a database security solution not monitor? (A)
Database changes (B) Sensitive data access (C) Database complexity (D)
Security events
8. What does it mean for a user to access a database through a multi-tier
infrastructure? (A) The user accesses the database through web or application
servers (B) The user opens connections to multiple databases simultaneously
(C) Each user connection to the database is layered to improve performance (D)
Multiple levels of access to the database are available to the user
https://www.proprofs.com/quiz-school/story.php?title=database-security
9. _____ limits who gains access to the database while _____ limits what a user
can access within the database. (a) Access authentication, user definition (b)
Access authentication, view definition (c) Data access, user monitoring (d)
Access control, database security
10.____ is the process of transforming data into an unreadable form to anyone who
does not know the key. (a) Data authentication (b) Data security (c) Data
encryption (d) Database security management
https://study.com/academy/practice/quiz-worksheet-database-security-
management.html
11. A computer security protocol for logging-in can be considered as the example
of the ______ component of an information system. (a) Data (b) Software (c)
Procedure (d) Hardware
https://www.javatpoint.com/dbms-mcq
12.
THEORY
1. Define Presentation Software (2 Marks)
b. List 8 uses of presentation package (8 Marks)
2. State the steps involved in starting presentation package (8 Marks)
b. Define PowerPoint (2 Marks)
3. Mention 4 benefits of a presentation package (5 Marks)
b. Outline three guideline for creating a good Ms PowerPoint presentation
(6
Marks)
4. List 5 features of presentation package (5 Marks)
b. List 5 features of standard toolbar in presentation package (5 Marks)
5. State the steps in creating a blank presentation (5 Marks)
b. State 10 features of formatting toolbar (5 Marks)
6. Mention the steps involved in saving a presentation (5 Marks)
b. State the steps in exiting presentation (5 Marks)
All the questions was gotten from Data Processing textbook for SS2 page 128 -
144