SS 2 DATA PROCESSING QUESTIONS
1. Records in a file are inserted as they arrive (a) Serial (b) sequential (c) indexed (d)
random
2. …………….is the collection of related data items or field. (a) Data item (b) Field (c)
Record (d) File
3. ……………….is the smallest unit of information stored in computer file (a) Data item (b)
Field (c) Record (d) File
4. ………………..file is referred to as direct access file (a) Random (b) Indexed (c) Serial
(d) Sequential
5. A file that is sorted on a sequence of fields is called……………… (a) Heap file (b)
random file (c) Stack file (d) hash file.
6. An internet benefit that helps people to get materials and read them in preparation for
examination is called (a) E-Learning (b) reference files (c) E-resources (d) E-
coordination
7. A term used to refer to the process of accessing and viewing web pages on the Internet is
called………… (a) Browse (b) Opera (c) Internet (d) scroll
8. All are examples of internet browsers except……….. (a) Opera (b) Safari (c) Chrome (d)
Emoticon
9. A global system of interconnected computer network that uses the standard Protocol suite
is called (a) Internet (b) Selection (c) user net (d) Sequential
10.A browser can also be called……………. (a)Web browser (b) Organization browser(c)
Storage browser (d) Correction browser
11. A Mail that one has not requested for is called ………… (a) Spam (b) View (c) Delete
(d) Creation
12. ……………is not a measure of internet security (a) Encryption (b) protocols (c)
Cryptographic methods (d) Usenet
13.A secret word or string of characters that is used for authentication, to prove identity or
gain access to a resource ——– (a) Computer file (b) Manual file (c) Password (d)
Overwriting
14. A branch of computer security specifically related to the internet is called…… (a)
Internet breach (b) Encryption (c) dotted file (d) Anti-spam.
15.———— is not a way in which the internet can be abused (a) Mail bomb (b) Hacking (c)
Spam mails (d) TCP transponder
16.The provide us with a means of organizing and structuring the data.
17.A set of tools and procedures for applying the tools that specifies the notation used within
the organization is called
18.To transform a relationship into an entity on an ERD, we use a special symbol called
an(a) Entity (b)Attribute(c)associative entity (d) none of the above