Online Exam On Data Processing For Ss3

50 Questions | Total Attempts: 207

SettingsSettingsSettings
Please wait...
Online Exam On Data Processing For Ss3

This online exam on Data Processing is designed only for SS3 students of Urban Girls' Secondary School which Arinze Ifeanyi is the Teacher in-charge. I (Arinze Ifeanyi) wish you success as you take this exam in preparation of your Jamb CBT exams. If you have any question regarding this exam, ask here. May God lead you through. Remain blessed. Arinze Ifeanyi. 08035596288


Questions and Answers
  • 1. 
    The compilation of data that is arranged for better and faster retrieval and is accessed via computers is known as
    • A. 

      browsing

    • B. 

      Internet

    • C. 

      Database

    • D. 

      Online database

  • 2. 
    ____________ allows or disallows user actions on the database and objects within it
    • A. 

      Database

    • B. 

      Internet

    • C. 

      Database security

    • D. 

      Internet security

  • 3. 
    Security risks to database systems include all except
    • A. 

      Unintended activity or misuse by authorized database users

    • B. 

      Modification of database data by the administrator

    • C. 

      Physical damage to database servers caused by computer room fires or floods

    • D. 

      Malware infections causing incidents such as unauthorized access, leakage or disclosure of personal or proprietary data

  • 4. 
    One importance of database security is
    • A. 

      Confidential misconduct

    • B. 

      Ensure the data confidentiality

    • C. 

      Preventing authorized user

    • D. 

      Prevent authorized data modification

  • 5. 
    One of these is not a key issue in the security of database
    • A. 

      Importance

    • B. 

      Privacy

    • C. 

      Availability

    • D. 

      Disclosure

  • 6. 
    The database security issued that is concerned with improper denial of access to information is known as
    • A. 

      Disclosure

    • B. 

      Privacy

    • C. 

      Availability

    • D. 

      Secrecy

  • 7. 
    The database security that concerns the need to ensure that entire database is secured from external and internal system breaches is 
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Authenticity

    • D. 

      Availability

  • 8. 
    1. The scrambling of data in such a way that only someone with the secret code / key can read it _______________
  • 9. 
    1. _____________ used to recover from a failure either when a single-instance database crashes or all instances of a database crashes
  • 10. 
    The goal of crash and instance recovery is to restore the data block changes located in the cache of the dead instance and to
    • A. 

      Prevent authorized users from accessing files

    • B. 

      Blog spammers

    • C. 

      Close the redo thread that was left open

    • D. 

      Control which data is uploaded and downloaded

  • 11. 
    Encryption is useful especially to
    • A. 

      Block unwanted user from browsing the internet

    • B. 

      Control which user is accessing the internet

    • C. 

      Give access only to people known by an admin

    • D. 

      Pass a secret message from one place to another without anyone else being able to read it

  • 12. 
    One problem of encryption is that it is 
    • A. 

      Easy to install

    • B. 

      Slower than normal browsing

    • C. 

      The highest security feature to use

    • D. 

      Available to everyone

  • 13. 
    One characteristic of Crash and instance recovery is that they 
    • A. 

      Redo the changes using the current online data files

    • B. 

      Use instance control

    • C. 

      Process information in orderly manner

    • D. 

      Check when a photo is uploaded

  • 14. 
    ___________ refers to recovery of datafiles
  • 15. 
    The database that can do multiple tasks in parallel allowing the database to make use of multiple CPU cores and multiple disks that are standard for modern database servers is
    • A. 

      Parallel database

    • B. 

      Distributed database

    • C. 

      Instance recovery

    • D. 

      Crash recovery

  • 16. 
    Normal index is also known 
    • A. 

      Unique index

    • B. 

      Primary key index

    • C. 

      Ordinary index

    • D. 

      Normal index also known

  • 17. 
    One advantage of distributed database is that it (a)  (b) (c)
    • A. 

      Reflects organizational structure.

    • B. 

      Manages other recovery

    • C. 

      distributes other recovery reduce reliability and availability

    • D. 

      None of the above

  • 18. 
    One of these is not part of the scenarios necessitate media recovery
    • A. 

      You restore a backup of a datafile

    • B. 

      You restore a backup control file (even if all datafiles are current)

    • C. 

      The datafile is taken offline

    • D. 

      Datafile is a security itself

  • 19. 
    One is these is not a condition for performing incomplete recovery of the whole database (a)  (b) (c)  (d) .
    • A. 

      Media failure destroys some or all of the online redo logs

    • B. 

      A user error causes data loss, for example, a user inadvertently drops a table

    • C. 

      You cannot perform complete recovery because an archived redo log is missing

    • D. 

      You lose your current control file and cannot use a backup control file to open the database

  • 20. 
    The components of computer network include all except (a) cables (b) switch (c) internet. (d) NIC
    • A. 

      Cables

    • B. 

      Switch

    • C. 

      Internet

    • D. 

      NIC

  • 21. 
    _____________ is used to quickly locate data without having to search every row in a database table every time a database table is accessed
  • 22. 
    DAM stands for _____________
  • 23. 
    __________ is the practice of linking two or more computing devices together for the purpose of sharing data
  • 24. 
    NIC stands for ______________
  • 25. 
    _________ indexes allow users to look up people’s names and find information about personal and family relationships (a) book (b) pictorial (c) genealogy (d) cumulative
    • A. 

      Book

    • B. 

      Pictorial

    • C. 

      Genealogy

    • D. 

      Cumulative

Back to Top Back to top