This is the First Half Examination of Pre-WAEC Examination on Data Processing for SS3 this is to prepare them extensively for their upcoming WAEC Examination.
S3 Data Processing Pre-Waec Examination (First Half)
1. GOOD SHEPHERD SCHOOLS
HOPE TOWN
SUBJECT: DATA PROCESSING CLASS: SS3 EDUCATOR: MR. EJIRO
CONTINUOUS ASSESSMENT TEST ONE (C.A.T 1)
SECTION A: OBJECTIVES
INSTRUCTION: Each question carries 1 mark each
1. What are data types? A. It specifies what type
of data is expected inside of each column in a
table (e.g. Number, date, string) B. It specifies
how many tables you will create when you
convert your Entity Relations Model to a Logical
Data Model C. It specifies the database-name
D. It counts how many attributes you have
2. Simple representations of complex real-world
data structures A. Data models B. Model C.
Data modeling D. Data
3. The following are examples of Relationships
except A. One-to-many (1:M) B. Many-to-many
(M:N or M:M) C. One-to-one (1:1) D. Many-to-
one (M:1)
4. The following are advantages of Hierarchical
Model except
A. Efficient with 1:1 relationships B.
Parent/child relationship promotes conceptual
simplicity and data integrity C. Database
security is provided and enforced by DBMS D.
Promotes data sharing
5. _______ uses graphic representations to model
database components A. entity instance or
entity occurrence B. Unified Modeling
Language (UML) C. Entity Relationship Diagram
(ERD) D. Data Modelling Query
6. A table that is in 2NF and contains no transitive
dependencies is said to be in ______ A. weak B.
3NF C. Atomic attribute D. BCNF
7. A ______ identifier is composed of more than
one attribute A. Composite B. Relational
models C. Atomicity D. 3NF
8. Data redundancy produces ______ A. Data
integrity problems B. Recursive C. Candidate D.
Relational models
9. ______ is a process to help reduce the
likelihood of data anomalies A. Data integrity
problems B. Normalization C. RDBMS D.
Composite
10. ____ database tables often lead to various
redundancy disasters in production databases
A. Detailed narrative B. 4NF C. Unnormalized D.
Weak
11. From a structural point of view ____ is better
than 1NF A. 2NF B. Determinant C. Derived D.
1NF
12. A ______ must not contain a repeating group
A. Unary B. Determinant C. Atomicity D.
Relational table
13. A table that has all key attributes defined has
no repeating groups and all its attributes are
dependent on the primary key is said to be in
_____ A. 1NF B. Relational table C. Database
type D. Atomic attribute
14. 1NF β 2NF and 3NF are _____ A.
Normalization stages B. Transitive dependency
C. Atomic attribute D. Partial dependency
15. Within the database, tables can be
normalized or brought to comply with
___________ Rules A. Normalization B.
Hierarchical C. Atomic D. Prime
16. The use of Visual Display Unit was a
breakthrough in the A. first generation
computers B. second generation computers C.
third generation computers D. fifth generation
computers
2. 17. In hexadecimal systems D is equivalent to A.
15 B. 14 C. 13 D. 10
18. The sum of 1102 and 1012 is A. 11012 B. 11102
C. 11002 D. 10112
19. A company has four computer systems and
one printer and one scanner for their daily
operations. One factor that can accomplish the
company to connect all the devices in a
network is the need to A. provide efficient
services B. save running cost C. share software
only D. use a wireless connection
20. One similarity between the internet and
intranet is that they both A. were invented by
the same company B. use the same technology
C. have the same coverage D. are open to the
public
21. The process of copying data or information
from the internet to a personal computer is
termed A. browsing B. downloading C.
retrieving D. surfing
22. An entrepreneur who wishes to send digital
signal over a telephone line would need a A.
hub B. modem C. router D. switch
23. Graphical User Interface is considered user
friendly because of the following reasons
except that it A. compels the user to learn all
the commands before operating the system B.
displays all the options available to the user for
easy access C. is easier for users to operate and
understand D. makes the icon and menus
familiar to the users
24. The symbols dialog box of MS Word
application is located on the A. format menu B.
help menu C. insert menu D. view menu
25. Pressing the key combination Ctrl + J on a
selected text in a Microsoft word document
would A. align the text B. deselect the text C.
justify the paragraph D. justapose the text
26. Merge button in spreadsheet application is
used to A. combine adjacent tables B. convert
selected cells into a single cell C. merge two
tables D. split a cell into two or more cells
27. One advantage of the first generation
computers is A. processing speed B. portability
C. heating effect D. burglar-proof
28. Magnetic Ink Character Recognition is applied
on A. voice recognition devices B. mobile
devices C. large data capturing machines D.
bank cheques
29. Internet banking entails A. applying computer
networks in banking operations B. applying
computers to automate banking operations C.
generating tokens and one time passwords for
online payments D. using ATM for banking
operations
30. Which of the following parts of the computer
ensures the smooth operation of its hardware?
A. main memory B. control unit C. auxiliary
storage D. arithmetic and logic unit
31. Basic computer operations include the
following except A. control B. input C. output D.
process
32. One disadvantage of electronic data
processing is A. handling complex computation
B. medium for effective storage C. processing
data at a phenomenal speed D. vulnerability to
attack
33. Which of the options A to D is not a medium
of information transmission A. cable B. satellite
C. television set D. wireless channel
34. One characteristics ofa dirty mouse is that the
mouse A. is not recognized by the system B.
disconnect itself from the system C. pointer
changes appearance D. pointer moves
erratically
35. One responsible way of using the computer is
A. software piracy B. phishing C. pharming D.
ethical hacking
36. Any activity carried out to protect the user
from hazards while using the computer is called
A. computer ethics B.computer maintenance C.
laboratory rules D. safety measure
37. In order to protect on the world wide web
from threats, the user should A. install the
latest operating system version B. Install a
single user antivirus software C. Implement an
internet security software D. deploy online
transaction software
38. Responsibilities of a database administrator
include the following except performing A.
3. database backup B. data recovery C. network
maintenance D. user authentication
39. The following tools are used for protecting the
computer against virus attack except A. avast
anti-virus malware B. kaspersky C. norton D.
trojan horse
40. In the model furniture (table, chair,
wardrobe), furniture is A. relation B. schema C.
tuple D. attribute
41. Which of the following database operation
does not require a data manipulation language
A. modification of information B. insertion of
new information C. deletion of information D.
creation of information
42. The file organization method which allows
records to be accessed in any sequence is A.
index B. random C. sequential D. serial
43. Providing access control to a school record is
the responsibility of a A. database
administrator B. programmer C. system
administrator D. system analyst
44. The first generation computers made useof A.
low level programming language B. high level
programming language C. object oriented
programming language D. procedural
programming language
45. Which of these channel would enable
business transactions between a buyer from
Nigeria and a seller from Ghana A. e-library B.
e-library C. e-commerce D. podcasting
46. The website
www.goodshepherdschools.edu.ng indicates
that the Good Shepherd Schools is A.
commercial B .non-organization C. research
organization D. educational organization
47. A special effect that controls the way slides
appear in power point presentation is called A.
word art B. transition C. theme D. animation
48. The following are the attributes of computer
virus except the ability to A. modify other files
B. replicate itself in order to spread to other
files and system C. execute without the userβs
approval D. warn the user before execution
49. The performance of the computer can be
enhanced by A. using larger monitor B. using
faster printer C. installing a scanner D.
increasing the memory size
50. The type of data entered into a table in
database follow a set of rules known as A.
protocols B. regulators C. algorithms D.
constraints
Note The Following
1. Write legibly as illegible hand writing will attract reductionof marks
2. You are to write out the questions before answering them, failure todo this will attract
reductionof marks
SECTION B: THEORY
ANSWER ALL QUWSTIONS PLEASE!!!!
QUESTION 1 β 10 Marks
a. Explain Database Model β2 marks
b. List five (5) types of Database Model β 2 marks
4. c. What are the significance of a Database Model β 2 marks
d. Difference between Primary Key, Composite Key and Foreign Key β 4 marks
QUESTION 2 β 10 Marks
a. Use the relational data model below to draw a hierarchical data model β 4 marks
Student Table
S_id S_name S_age
121 Simeon Mercy 14
118 Adesokan Ajibola 17
130 Joseph Precious 16
Grade Table
G_id S_name S_id
A1 Mathematics 121
A1 Data Processing 118
A1 Chemistry 118
B2 English Language 130
b. State four (4) classes of computer based on size β 2 marks
c. Explain the term Information and Communication Technology β 2 marks
d. State two ways ICT has impacted on the society β 2 marks
SECTION C: TEST OF PRACTICALS
QUESTION 3 β 10 Marks
The table below shows selected fields and Data Types in MS Access
Use it to answer the following questions below
5. What is the appropriate data type for:
i. Date of Birth ii. Fees β 2 marks
B. If MS Access is running, describe the procedure to:
i. Create a table with the fields as given above using design view β 2 marks
ii. Set the Mat. No. Field as the primary key β 2 marks
iii. Set the Full Name Field to a maximum of 50 characters β 2 marks
iv. set the input value for Date of Birth to medium date β 2 marks
QUESTION 4 β 10 Marks
Akimola Winner has just opened a computer business center within Good Shepherd Hope Town Campus
a. State three devices Akimola Winner needs to buy to start up his business center β 3 marks
b. State three computer services that may be provided in the business center β 3 marks
c. Give two application software needed in the business center β 2 marks
d. Outline one precaution that must be taken by Akimola Winner to ensure the safety of this computers if
he must accept documents or files in another device from his customer β 2 marks
QUESTION 5 β 10 Marks
Akomolede Samuel was tasked by Mr. Ejiro to make two reports on Microsoft word, his to bring it to Mr.
Ejiro for proper vetting.
a. Outline the steps to display the number of words, lines of text, number of pages and number of paragraph
b. Akomolede Samuel is to display the two documents simultaneously, state the two ways this can be made
possible
(NOTE PLEASE: You are to properly outline the steps in each of the ways. Thanks)
c. Outline the steps Akomolede Samuel will take in protecting the document using password
d. Akomolede Samuel is to put the two documents in a folder name Mr_Ejiro Files and his to encrypt that
folder and send to Mr. Ejiro electronically
i. Outline the steps to put the two documents in a folder
ii. Outline the steps to encrypt the folder
iii. State the two ways Akomolede Samuel will take to send it to Mr. Ejiro
(NOTE PLEASE: For each way, you are to properly outline the steps. Thanks.)