0% found this document useful (0 votes)
3 views

Data Processing Ss3 2nd T-exam

This document is a Senior Three (3) Data Processing examination paper for the second term of the 2022/2023 academic year. It includes objective questions related to database recovery, network architecture, and computer viruses, along with a theory section requiring detailed answers on specific topics. The marking guide for the objective section is also provided, indicating correct answers for each question.

Uploaded by

oluwaseyikemi26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Data Processing Ss3 2nd T-exam

This document is a Senior Three (3) Data Processing examination paper for the second term of the 2022/2023 academic year. It includes objective questions related to database recovery, network architecture, and computer viruses, along with a theory section requiring detailed answers on specific topics. The marking guide for the objective section is also provided, indicating correct answers for each question.

Uploaded by

oluwaseyikemi26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

SCHOOL:- 20.

T
NAME:-
CLASS: SENIOR THREE (3) S.S. 3
SUBJECT: DATA PROCESSING
SECOND TERM EXAMINATION 2022/2023 his is a term used to refer to the process of accessing and
SECTION A – OBJECTIVE viewing web pages on the internet is called___(a)Browse
1. The process by which a database is moved back to a (b) internet (c) webpages
consistent and usable state is called___(a) cash recovery 21. ___ is a private network within an organization that
(b) crash recovery (c) past recovery (d) undo recovery resembles the internet. (a) internet (b) Intranet (c) WAN
2. The recovery algorithm that uses no-force and steal (d) server
approach is____(a) ARIAS (b) ARIES (c) ARREARS (d) 22. The internet provides users with facilities for online___ of
ARIS examinations like WAEC, NECO and JAMB (a) E-learning
3. ARIES works in_____Phases (a) 3 (b) 2 (c) 1 (d) 4 (b) E-registration (c) commerce (d) banking
4. Which of these is not a crash recovery type___ (a) 23. ___ is a software program written with malicious intentions.
ARIES (b) Media recovery (c) Check pointing (d) UNDO (a) Computer virus (b) infection (c) e-scan (d) Anti-virus
5. ____ Crash recovery uses backup files (a) Check point 24. _____ deletes the information contained in the files. (a) Fat
(b) ARIES (c) Media recovery virus (b) micro virus (c) Overwrite virus (d) Polymorphic virus
(d) atomicity 25. _____utilizes viruses or Trojans to gain access to your
6. _____ system seeks to improve performance through computer, to steal data, invade privacy or use computer for
parallelization of various operations. (a) parallel database their evil purposes. (a) Hackers (b) files (c) human (d) detector
(b) distributed database (c) relational database (d) flat 26. A virus that can track internet searching habits and possibly
database redirect web site activity is called__ (a) logic bomb (b) fat virus
7. The architecture where multiple processors are attached (c) spyware (d) worm
to an interconnected network and access a common 27. ____ are those who assemble, install, repair and operate the
region of memory is called ………. (a) shared memory (b) computer system. (a) Computer personnel (b) Mechanic (c)
shared disk system (c) share nothing(d) all of the above Doctor (d) Lawyer
8. In___partitioning, tuples are sorted and ranges are 28. A good computer professional must possess____ writing skill.
chosen for the sort key values.(a) round robin (b) hash (c) (a) logical (b) technical (c) physical (d) little
range (d) table 29. A____is the one that writes a set of instructions to be executed
9. ___ Partitioning is suitable for efficiently evaluating by the computer. (a) software programmer (b) data analyst (c)
queries that access the entire relation. (a) range (b) round computer operator (d) data entry clerk
robin (c) hash (d) query 30. The_____a professional that install, manage and maintaining of
10. The following are examples of parallel database except. ICT cabling/ transport network and architecture. (a) computer
(a) implementation is highly expensive (b) speed (c) educator (b) enterprise system administrator (c) database
reliability (d) capacity administrator (d) programmer
11. A distributed database system is a system that permits
………. data storage across several sites. (a) physical (b) MARKING GUIDE (ANSWERS)
logical (c) vertical (d) horizontal 1.B 2.B 3.A 4.A 5.A
12. Network traffic blocking is one of the problems related to 6.A 7.A 8.C 9.B 10.A
the ………. model.. (a) parallel database (b) distributed 11.A 12.C 13.C 14.D 15.C
database (c) client server (d) network
16.A 17.B 18.C 19.A 20.A
13. This is a process of splitting a relation into smaller relation
or fragments. (a) Replication (b) shared memory (c) 21.B 22.B 23.A 24.C 25.A
fragmentation (d) implementation 26.C 27.A 28.B 29.A 30.B
14. One of the following is architecture of distributed THEORY – ANSWER ONLY 3
database system. (a) table (b) fragment (c) replication (d) 1a. Discuss the concept of ARIES in crash recovery
client server 1b. Explain difference between media recovery and check
15. ____are language that computers used to talk to each point.
other over a network (a) Media (b) user (c) Protocol (d) 1c. Explain difference between a system crash and a media
server failure.
16. An example of the bus system is the____(a) Ethernet (b) 2a. Define parallel database.
intranet (c) ring (d) star 2b. Enumerate the three architectures for database.
17. ___is the term used to describe the physical arrangement 2c State three methods data can be partitioned.
of computer in networks. (a) Internet (b) Topology (c) 2d. What are the merits and demerits of parallel database
Ethernet (d) hub 3a. What is Network topology?
18. The network configuration in which the terminals are 3b. List and explain the three types of network topology
connected in the same fashion as the branches of a tree 4a. Define Networking 4b. State four benefits of Networking.
is called____(a) Flat (b) relational (c) Hierarchical (d) 4c. Differentiate between intranet and extranet
network 5a. Mention five examples of computer virus. 5b. State five
19. One of the following is a communication medium. (a) sources of virus infect micro computer..
coaxial cable (b) book (c) typewriter (c) windows (d) 5c. State seven virus warning sign.
episode 5d. State five ways of preventing computer virus.

You might also like