0% found this document useful (0 votes)
4 views

02e5ea0a~SS3 DP Mock Exams Questions 2021-Sent

This document is a mock examination for SS3 students at Excel College, Ejigbo, Lagos, covering the subject of Data Processing. It includes multiple-choice questions on topics such as MS Excel, computer systems, data security, and networking, as well as theory questions requiring detailed answers. The exam aims to assess students' understanding of data processing concepts and their practical applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

02e5ea0a~SS3 DP Mock Exams Questions 2021-Sent

This document is a mock examination for SS3 students at Excel College, Ejigbo, Lagos, covering the subject of Data Processing. It includes multiple-choice questions on topics such as MS Excel, computer systems, data security, and networking, as well as theory questions requiring detailed answers. The exam aims to assess students' understanding of data processing concepts and their practical applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

EXCEL COLLEGE, EJIGBO – LAGOS

SESSION: 2020/2021 TERM: MOCK-EXAMINATION


CLASS: SS3 SUBJECT: DATA PROCESSING TIME: 2 HRS

OBJECTIVES: CHOOSE THE ANSWERS FROM THE OPTIONS A – D.


1. MS Excel is an example of _____ (A) Spreadsheet (B) Worksheet (C) Table-Sheet D) Workbook

2. _____ is the person who recommends systems for organizations. (A) System Analyst (B) Computer
Engineer (C) Computer Programmer (D) Database Administrator

3. ASCII and EBCDIC are the popular character coding systems. What does EBCDIC stand for?
(A) Extended Binary Coded Decimal Interchange Code (B) Extended Bit Code Decimal Interchange Code
(C) Extended Bit Case Decimal Interchange Code (D) Extended Binary Case Decimal Interchange Code

4. One major way of enforcing Data Security is ____ the System (A) Password (B) Shutdown (C) Cover
( D) Clean

5. . Google (www.yahoo.com) is a _____ (A) Search Engine (B) E-Commerce site (C) Chat service
(D) Commercial

6. Integrated Circuits (ICs) are related to which generation of computers? (A) First generation
(B) Second generation (C) Third generation (D) Fourth generation

7. Software in computer (A) Enhances the capabilities of the hardware machine


(B) Increase the speed of central processing unit (C) Both of above (D) None of above

8. BCD is_____ (A) Binary Coded Decimal (B) Bit Coded Decimal (C) Binary Coded Digit
(D) Bit Coded Digit

9. The difference between memory and storage is that memory is _____ and storage is _________
A) Temporary, permanent B) Permanent, temporary C) Slow, fast D) All of above

10.The term gigabyte refers to____ (A) 1024 bytes (B) 1024 kilobytes (C) 1024 megabytes
D) 1024 gigabyte

11. Programs designed to perform specific tasks is known as ___ (A) system software (B) utility
programs (C) application software (D) operating system

12. Which of the following protocols is used for WWW? (A) ftp (B) IP (C) http (D) all of the above

13. Which one is the largest storage unit? (A) Kilobyte (B) Terabyte (C) Petabyte (D) Gigabyte

14. Operating system, Translators and Utilities come under? (A) System Software (B) Utilities
(C) Application Software (D) None of the above

15. Which of the following is a valid statement? (A) Data in itself is useless unless it is processed
(B) The data that is processed is called a program (C) The data which is not yet processed is information
(D) Information is processed by computer to generate data.

16. The translator program used in Assembly Language is called________ (A) Assembler (B) Interpreter
(C) Compiler (D) None of the above.
17. Which of the following is not anti-virus software? (A) Oracle (B) Norton (C) NAV (D) McAfee

1
18. WAN stands for _______ (A) Wide Area Network (B) Wap Area Network (C) Wide Array Net
(D) Wireless Area Network

19. An error in computer data is called_____ (A) Chip (B) Omission (C) Mistake (D) Bug

20. Which of the following is not a type of virus? (A) Boot Sector (B) Polymorphic (C) Multipartite
(D) Trojans

21. Which of them is not an ideal way of spreading the virus? (A) Infected website (B) Emails
(C) USBs (D) Keyboard

22. What is a FTP program used for? (A) Searching information on the net (B) Designing a website
(C) Connecting to the internet (D) Transfer files to and from an Internet Server

23. _____ is a field in a database table (or a combination of fields) that has a unique value.
(A) A Foreign key (B) An Alternate key (C) A Secondary key (D) A Primary key

24. Which of the following statements is false with respect to distributed databases?
(A) Data at each site are under control of the DBMS
(B) Multiple computer network sites are connected by a communication system
(C) Users may not be aware that they are using a distributed database
(D) Data at any site are only available to users at those sites

25. Data Security threats include: (A) Privacy invasion (B) Hardware protection
(C) Fraudulent manipulation of data (D) All of the above

26. ISP stands for_________ (A) Internet Service Protocol (B) Internet Security Protocol
(C) Integrated Service Provider (D) Internet Service Provider

27. Which of the following topology does not encourage Dummy terminals? (A) Mesh (B) BUS
(C) STAR (D) RING

28. Data integrity means________ (A) providing first access to stored data (B) ensuring correctness and
consistency of data (C) providing data sharing (D) none of the above

29. What are the columns in a Microsoft Access table called? (A) Reports (B) Fields (C) Rows
(D) Records

30. A Web address ending with domain name “.com” is _____ (A) A. An organization website
(B) A Commercial website (C) A Common site (D) A site which has very high traffic

31. Where are deleted files kept in the hard disk? (A) Floppy disk (B) Recycle bin (C) Memory
(D) Desktop

32. A table is in 2NF if it is if: (A) It has a Primary (B) It contains Atomic Data (C) It contains no
Redundant Data (D) All of the above

33. The term GIGO is related to______ (A) Accuracy (B) Reliability (C) Versatility (D) Automatic

34. _____ is Right-Aligned in Excel Cell? (A) Numbers (B) Text (C) Formulas (D) Strings

35. The two kinds of main memory are: (A) ROM and RAM (B) ROM and sequential
(C) Primary and Secondary (D) RAM and HardDisk

2
36. The Mode of Data transmission in which Signals are sent in two directions, but one direction at a time
(A) Half duplex (B) Full duplex (C) Partial Duplex (D) Simplex

37. Which of the reasons below do not satisfy the reason why people create a computer virus?
(A) Research purpose (B) Pranks (C) To make money (D) Protection

38. Which of the following is use to get data from user? (A) Form (B) Query (C) Report (D) Table

39. The Communication Protocol used by Internet is___ (A) TCP/IP (B) WWW (C) HTTP (D) FTP

40. Various apps and documents are represented with ______ on Windows desktop?
(A) Files (B) Folders (C) Icon (D) Pictures

41. How many bytes are in a 1 megabyte in computer language? (A) 10,024,00 (B) 124,576
(C) 1,048,576 (D) 1,248,576

42. Prevention of access to the database by unauthorized users is referred to as ___ (A) Integrity (B)
Productivity (C) Security (D) Reliability

43. Crazy Browser is a _____ (A) Any person who uses Internet often (B) Web Browser
(C) Somebody who commits crimes on the net (D) An expert in Browsing

44. Which of the following is not a stage in Data Modeling? (A) Conceptual (B) Abstraction
(C) Physical (D) Logical

45. Set of rules that governs data communication in a network is called ______ (A) URL (B) Protocol
(C) Topology (D) None

46. =, <, >, <= and >= are examples of ____ Operators. (A) Logical (B) Relational (C) Textual
(D) Arithmetic

47. _______ is very common among MS Excel, MS Access and MS Word. (A) Pictures (B) Tables
(C) Charts/ Graph (D) Window

48. Ability to animate objects and texts in a presentation is an attribute of ________?


(A) Corel Draw (B) PowerPoint (C) Photoshop (D) Java

49. _____ does not change when copied in a Worksheet Formular (A) Relative Cell (B) Absolute Cell
(C) Cell Reference (D) Formula Cell

50. Start button is contained in which of these bars? (A) Title bar (B) Task bar (C) Menu bar (d) Toolbar

3
THEORY: ANSWER ANY 4 Questions of your choice
1A. Define Database and DBMS and give 2 examples of DBMS (3mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

B. Outline any 6 Functions Formulas you know in MS Excel Spreadsheet – (3mks)


____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

C What do you understand by Data Integrity and Data Integrity Constraint? –(4mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

2A. What is a Chart or Graph in relation to Spreadsheet? Mention any 6 types of Charts/Graph (5mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

4
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
B. How many columns and rows are there in Excel 2010 Worksheet? (2mks)
___________________________________________________________________________________
___________________________________________________________________________________

C. Mention any 3 Characteristics of Computer Viruses (3mks)


____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

3A. State 5 Computer Professional Bodies in Nigeria and their responsibilities (5mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

B. (i) What is Computer Maintenance? (1mk)


____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

5
(ii) Give 4 signs that your Computer system has accumulated dirt. – (4mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
4A(i) Define a Computer Network and state 4 benefits of Computer Network to the users – (3mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
(ii) State any 2 functions of Operating System in the Computer (2mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

C. Mention 3 merits advantages and 2 demerits of Internet to the society. – (5mks)


____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
5A. With the Aids of diagrams, explain the 3 Architectures of Parallel Database (6mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

6
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
(B) Give 4 advantages of EDP over Manual Data Processing (4mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

6A. Write the full meaning of the following. (3mks)


(i) USB: ___________________________________________________________________
(ii) NIN: ___________________________________________________________________
(iii) TCP : __________________________________________________________________
(iv) HTTP: _________________________________________________________________
(v) SD-Card: _______________________________________________________________
(vi) BVN: __________________________________________________________________
B. List about 6 Network Devices you know and explain any 3 of them. –(6mks)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

7
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
C. What is Crash Recovery? (1mk)
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

You might also like