0% found this document useful (0 votes)
12 views1 page

SS 2 saATA PROCESSING QUESTIONS

The document consists of a series of multiple-choice questions related to data processing, internet usage, and computer security. Topics covered include file types, internet browsers, email terminology, and security measures. It serves as a quiz or assessment tool for evaluating knowledge in these areas.

Uploaded by

daddysam111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views1 page

SS 2 saATA PROCESSING QUESTIONS

The document consists of a series of multiple-choice questions related to data processing, internet usage, and computer security. Topics covered include file types, internet browsers, email terminology, and security measures. It serves as a quiz or assessment tool for evaluating knowledge in these areas.

Uploaded by

daddysam111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

SS 2 DATA PROCESSING QUESTIONS

1. Records in a file are inserted as they arrive (a) Serial (b) sequential (c) indexed (d)
random
2. …………….is the collection of related data items or field. (a) Data item (b) Field (c)
Record (d) File
3. ……………….is the smallest unit of information stored in computer file (a) Data item (b)
Field (c) Record (d) File
4. ………………..file is referred to as direct access file (a) Random (b) Indexed (c) Serial
(d) Sequential
5. A file that is sorted on a sequence of fields is called……………… (a) Heap file (b)
random file (c) Stack file (d) hash file.
6. An internet benefit that helps people to get materials and read them in preparation for
examination is called (a) E-Learning (b) reference files (c) E-resources (d) E-
coordination
7. A term used to refer to the process of accessing and viewing web pages on the Internet is
called………… (a) Browse (b) Opera (c) Internet (d) scroll
8. All are examples of internet browsers except……….. (a) Opera (b) Safari (c) Chrome (d)
Emoticon
9. A global system of interconnected computer network that uses the standard Protocol suite
is called (a) Internet (b) Selection (c) user net (d) Sequential
10.A browser can also be called……………. (a)Web browser (b) Organization browser(c)
Storage browser (d) Correction browser
11. A Mail that one has not requested for is called ………… (a) Spam (b) View (c) Delete
(d) Creation
12. ……………is not a measure of internet security (a) Encryption (b) protocols (c)
Cryptographic methods (d) Usenet
13.A secret word or string of characters that is used for authentication, to prove identity or
gain access to a resource ——– (a) Computer file (b) Manual file (c) Password (d)
Overwriting
14. A branch of computer security specifically related to the internet is called…… (a)
Internet breach (b) Encryption (c) dotted file (d) Anti-spam.
15.———— is not a way in which the internet can be abused (a) Mail bomb (b) Hacking (c)
Spam mails (d) TCP transponder
16.The provide us with a means of organizing and structuring the data.
17.A set of tools and procedures for applying the tools that specifies the notation used within
the organization is called
18.To transform a relationship into an entity on an ERD, we use a special symbol called
an(a) Entity (b)Attribute(c)associative entity (d) none of the above

You might also like