Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views3 pages

Data Processing Ss1

The document consists of a series of multiple-choice questions and theory prompts related to computer science concepts, including data processing, computer components, and the history of computing. It covers topics such as data verification, digital computers, social media, database management, and computer classifications. Additionally, it includes theoretical questions that require definitions and explanations of various computing terms and concepts.

Uploaded by

Solomon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views3 pages

Data Processing Ss1

The document consists of a series of multiple-choice questions and theory prompts related to computer science concepts, including data processing, computer components, and the history of computing. It covers topics such as data verification, digital computers, social media, database management, and computer classifications. Additionally, it includes theoretical questions that require definitions and explanations of various computing terms and concepts.

Uploaded by

Solomon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1. Which of the following persons invented the punch card machine? A. Blaise Pascal B.

Gottfried Leibniz
C. J. Prosper Eckert D. Dr. Herman Hollerith
2. Convert 478 to its binary equivalent. A. 1001112 B. 1100112 C. 100012 D. 11110112
3. The operation of checking input data against specified criteria is referred to as. A. data verification B. data
validation C. data cross check D. data control
4. Which of the following is not a source of data collection. A. observation B. interview C. questionnaire
D. classification
5. Which of the following is true about digital computers. A. They consist of magnetic core memory. B. they
understand data as a continuous measurement of a physical quantity. C. they represent numbers through a
string of binary digits. D. they are mainly used for scientific purposes.
6. Facebook, Twitter and WhatsApp are examples of: A. social media B. social communication
C. networking media D. search engines
7. Which of the following is not an application of computers? A. bank notes counter B. point of sales
terminal C. Automated Teller Machine D. traffic lights control
8. Which of the following is secondary storage device. A. RAM B. bubble memory C. floppy disk
D. EPROM
9. Information analysis procedures includes the following except A. skim and scan B. recognizing
interrelationships C. interpret and conclude D. identifying propaganda and bias
10. The advantages of electronic data processing includes the following except A. automatic processing
B. hacking C. fast and reliable processing D. storage capacity
11. Which of the following is not a transmission medium? A. twisted pair cables B. coaxial cables
C. wireless D. modem
12. Information transmission by television is classified as A. multimedia transmission B. polymedia
transmission C. unimedia transmission D. monomedia transmission
13. Which of the following are the basic components of a computer network? I. A minimum of two computers
II. Printers III. Network interface card. A. I and II B. I and III C. II and III D. I, II and III
14. Social networking does not promote. A. personal publicity B. business expansion C. e-commerce D. e-
payment
15. Companies that provide internet access are referred to as A. fixed network operators B. network service
providers C. internet service providers D. internet network operators
16. While typing a MS word document, Akin inserted footer in the document in order to A. enhance the
overall appearance of the document. B. make the document more readable C. insert page numbers
D. make it appear on the document when printed.
17. The spreadsheet symbol used to convert a number to a label is A. quotation mark (“ “) B. equality sign (=)
C. underscore (_) D. apostrophe sign (')
18. In spreadsheets, data would not be accepted into a cell by pressing the. A. Enter key B. Arrow key C. Esc
key D. Tab key
19. A field in a database table is also known as A. index B. relation C. attribute D. key
20. The property of a system software that enables it to execute more than one program at a time is referred to
as A. compiling B. virtual memory C. multitasking D. load modules
21. Which of these operations would not close MS word application? A. Pressing the Alt + F4 keys
B. clicking the X button on the title bar C. choosing exit from the file menu drop down box D. selecting
the close from the file menu drop down dialogue box
22. The feature in a database application that acts as an interface between the user and the database is called a?
A. query B. report C. form D. table
23. Planning and creating websites are stages in? A. web analysis B. web maintenance C. web design
D. web publishing
24. The type of data entered into a table in database follow a set of rules known as? A. protocols B. regulators
C. algorithms D. constraints
25. Which of the following drawing tools would create special effects for texts? A. Smart Art B. Shape tool
C. Textbox D. Word Art
26. The study of the effect of interaction between the computer and human users is referred to as computer
A. ergonomy B. economy C. ergophobia D. biomechanics
27. In MS Powerpoint, the action of holding down the left mouse key and moving the mouse around the slide
would A. highlight an item B. drag an item C. select an item D. move an item
28. A file kept in case of an accident or natural disaster is called A. master B. transition C. back-up
D. reference
29. Which of the following is not a preventive maintenance measure? A. Regular update of the operating
system B. Proper shut down of the system C. use of uninterrupted power supply D. data recovery
30. Which of the following is not a safety equipment in a computer laboratory? A. surge protector B. metal
detector C. smoke detector D. fire extinguisher
31. Which of the following is not a computer professional? A. Network Administrator B. Web Master
C. System Analyst D. File Manager
32. The following are destructive software except A. drivers B. worms C. trojan horses D. logic bomb
33. The type of file organization in a DVD-ROM is? A. direct access B. sequential C. serial D. hierarchical
34. Which of these measures would not secure data in database? A. Encryption B. Data integration
C. Personal Identification Number D. Username and passwords
35. The television set displays information as A. antenna signals B. visual signal C. audio signals D. audio-
visual signals
36. Which of the following is not an ancient medium for transmitting information? A. Fire lighting B. Beating
of drums C. Telephone D. Whistling
37. A program developed to protect the computer from malicious software is referred to as A. Trojan B. driver
C. antivirus D. spyware
38. One of the advantages of a parallel database is A. data sharing B. data security C. faster processing of
data D. uniform memory access
39. In a relational database management system, files are organized as relations and A. tuple B. modules
C. tables D. forms
40. The exchange of information over a network follows a set of rules called A. transmission rules B. transfer
rules C. channels rules D. protocols
41. Who developed the first digital electrical computer? A. Blaise Pascal B. Joseph Jacquard C. Mauchly and
Eckert D. Von Leibniz
42. Which generation of computers made use of integrated circuit? A. Fourth B. Third C. Second D. First
43. Which of the following is an alphabetical data? A. Bed B. Ax44jj C. AB+CD D. %
44. The type of data which consist of text, number, audio, graphic and animation is called A. data set
B. multimedia data C. multi-purpose data D. multi-variable data
45. Which of the following factors is not considered when classifying computers? A. Location B. Size
C. Type D. Purpose
46. Which of the following is not used for online shopping? A. MasterCard B. Credit card C. Verve card
D. Sim card
47. Which of the following is a negative impact of ICT in education? A. Plagiarism B. E-Library C. Distance
Learning D. Computer-based test
48. Which of the following are parts of a computer processor? A. CPU and main memory B. Control unit and
ALU C. Operating system and application D. Main memory and storage
49. Data gathering involves the following means except A. counting process B. voting process C. measuring
process D. calculating process
50. Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of Y is 16bits.
Which of the following statement is true? A. X can process half as much data as Y at the same time B. X
can process the same amount of data as Y at the same time. C. X can process two times as much data as Y
at the same time. D. X can process four times as much data as Y at the same time.
THEORY
Instruction: Answer all.
1. (a) Define the following
(i) Data (ii) Processing System (iii) Information (iv) Data Processing
(b) List 5 properties of data
(c) Explain extensively the data processing cycle.
2. (a) List and explain the two types of data. Give two examples each.
(b) List 5 early mechanical or electro-mechanical counting devices. Explain only two (2).
(c) (i) Give three disadvantages of early counting devices.
(ii) Give three examples of data processing.
3. (a) (i) What is Digitalization?
(ii) Give three benefits of digitalization of data.
(b) List and explain extensively the technology of different information ages.
(c) Define the following:
(i) Hardware (ii) Software (iii) System Unit (iv) Peripherals (v) Peopleware
4. (a) Computers can be classified base on __________, ___________ and _________________
(b) Explain each classification in (a) extensively.
(c) List three features of first generation computers
5. Write the full meaning of the following acronyms
(i) AI (ii) LSI (iii) VLSI (iv) IC (v) PC

You might also like