Data Processing Questions and Answers

Data Processing questions to test candidates’ acquisition of basic skills of data processing and knowledge in the application of ICT in facilitating business transactions and education.

21.

The following precautionary measures are taken against virus infection except

A.

Downloading e-mail and attachment before scanning it

B.

Avoiding booting the computer with disks in it

C.

Regular updating of antivirus

D.

Avoiding the installation of piratted software

Correct answer is A

The precautionary measure downloading e-mail and attachment before scanning it is not taken against virus infection.

Here are some precautionary measures that can be taken against virus infection:

Regularly updating your antivirus software: This ensures that your antivirus software has the latest virus definitions to protect your computer from new viruses.
Avoiding opening suspicious e-mails and attachments: Many viruses are spread through e-mails and attachments. If you receive an e-mail from someone you don't know, or if the e-mail looks suspicious, don't open it.
Avoiding installing pirated software: Pirated software often contains viruses. If you don't want to get a virus, only install software from trusted sources.
Avoiding booting your computer with disks in it: If you boot your computer with a disk in it, the virus on the disk could infect your computer. Only boot your computer with disks from trusted sources.
It is important to note that no single precautionary measure can guarantee that your computer will not be infected with a virus. However, by taking all of these precautions, you can significantly reduce your risk of infection.

The precautionary measure of downloading e-mail and attachment before scanning it is not effective because viruses can be embedded in the e-mail or attachment itself. By downloading the e-mail or attachment, you are essentially giving the virus access to your computer.

It is better to scan the e-mail or attachment first before downloading it. If the scan finds a virus, you can delete the e-mail or attachment without putting your computer at risk.

22.

A digital platform for the delivery of public sector information and seminar to citizens is called

A.

E-library

B.

E-commerce

C.

E-learning

D.

E-government

Correct answer is D

A digital platform for the delivery of public sector information and seminars to citizens is called e-government. E-government refers to the use of digital technology to provide government services, information, and communication to the public. It encompasses various online services, information dissemination, and interactions between the government and citizens through digital means. E-library, e-commerce, and e-learning are related terms but refer to different concepts: online libraries, online commerce, and online learning, respectively.

23.

The information processing stage that produces detailed evaluation of data is

A.

Interpretation

B.

Collection

C.

Analysis

D.

Organization

Correct answer is C

The information processing stage that produces detailed evaluation of data is analysis.

Analysis is the process of breaking down information into its component parts and examining those parts. It is a detailed evaluation of data to identify patterns, trends, and relationships. Analysis can be used to answer questions, make decisions, and solve problems.

In the context of information processing, analysis is the stage where the data is examined in detail to identify its meaning. This may involve identifying patterns, trends, and relationships in the data. It may also involve comparing the data to other data sets or to known standards.

The analysis stage is an important part of the information processing cycle. It is the stage where the data is transformed from raw data into information that can be used to make decisions and solve problems.

 

24.

A pointing device that controls cursor movement on the screen is

A.

Trackball

B.

Plotter

C.

Keyboard

D.

Monitor

Correct answer is A

A pointing device that controls cursor movement on the screen is a trackball.

A trackball is a small, ball-shaped device that is used to control the movement of the cursor on a computer screen. The trackball is held in place by a socket and is rotated by the user's fingers. The rotation of the trackball causes the cursor to move in the corresponding direction on the screen.

Trackballs are often used in laptops and other portable devices where there is limited space for a mouse. They are also used by people with disabilities who have difficulty using a mouse.

25.

The aim of administering questionaire is to collect

A.

Data

B.

Information

C.

Specimen

D.

Statistics

Correct answer is A

The aim of administering a questionnaire is to collect data.

A questionnaire is a survey that is used to collect information from a group of people. The data collected from a questionnaire can be used for a variety of purposes, such as:

Research: Questionnaires are often used by researchers to collect data for their studies. For example, a researcher might use a questionnaire to collect data about people's attitudes towards a certain issue.
Marketing: Questionnaires can also be used by businesses to collect data about their customers. For example, a business might use a questionnaire to collect data about customer satisfaction with their products or services.
Evaluation: Questionnaires can also be used to evaluate the effectiveness of a program or intervention. For example, a school might use a questionnaire to collect data about the effectiveness of a new curriculum.
The data collected from a questionnaire can be used to answer questions, make decisions, and improve programs and services.

 

26.

Database Administrator is a professional who

A.

Handles packet sniffing in a network

B.

Designs, implements and maintains a database

C.

Performs data entry in a database

D.

Tests and detects vulnerabilities on hardware devices and software

Correct answer is B

A Database Administrator is a professional who designs, implements, and maintains a database. Database administrators are responsible for managing and overseeing the organization's databases to ensure they are efficient, secure, and reliable. Their tasks include designing the database structure, implementing data models, optimizing database performance, ensuring data security, creating backup and recovery plans, and more. They play a crucial role in ensuring that data is organized, accessible, and properly managed within an organization's database systems.

The other options mentioned—testing and detecting vulnerabilities, handling packet sniffing, and performing data entry—are tasks related to network security, network analysis, and data input, respectively, but they are not the primary responsibilities of a Database Administrator.

 

27.

Figure 4 is an entity relationship diagram in MS Access. Use it to answer the question

What kind of relationship exists between users and products as shown in Figure 4?

A.

One-to-many

B.

Many-to-many

C.

One-to-one

D.

Many-to-one

Correct answer is A

Looking at the arrow (relation) that connects Products table to the Users table. The infinity sign beside the products table represents the "Many" part of the relationship which is not present at the Users table (i.e it is "One" part of the relationship) . This means that a user can buy "any" number of products but a product can only be bought by "a" user. Therefore, the relationship between the "users" and "products" is one-to-many.

NB: Users are assumed to be buying products for illustration purposes.

Many-to-one relationship is if it's between the "Products" and the "Users".

28.

Figure 4 is an entity relationship diagram in MS Access. Use it to answer the question

How many entity are listed in Figure 4?

A.

30

B.

25

C.

3

D.

5

Correct answer is D

In an Entity-Relationship (ER) diagram, an entity represents a distinct and identifiable concept, object, or thing about which data is being stored. Entities are typically nouns that have attributes describing their properties. They serve as the building blocks of an ER diagram and are used to model the real-world entities or concepts that are relevant to the database being designed.

For example, in a university database, entities could include "Student," "Course," "Professor," and "Department," each with their own set of attributes that describe their characteristics. Relationships between entities, indicated by lines connecting them, show how these entities are related to one another and how data flows between them.

But in the Entity-Relationship (ER) diagram given above, the entities are "Users", "Products", "Sale", "Sale detail", and "Sale detail TMP" which are five (5) in numbers

 

29.

Which of the following devices is needed by a technician for protection against electrostatic discharge?

A.

Magnet

B.

Wrist strap

C.

Screw driver

D.

Surge protector

Correct answer is B

A wrist strap is needed by a technician for protection against electrostatic discharge (ESD).

ESD is a sudden discharge of electricity that can damage electronic components. It can occur when two objects with different electrical charges come into contact. When working on electronic components, it is important to prevent ESD from damaging them.

A wrist strap is a device that helps to prevent ESD by dissipating the electrical charge from the body to the ground. It is worn around the wrist and connected to a grounding point, such as a metal pipe or a ground rod.

30.

The speed of access to files in a random access file compared to other file organization methods is

A.

Very slow

B.

The same

C.

Relatively fast

D.

Slow

Correct answer is C

The speed of access to files in a random access file compared to other file organization methods is relatively fast.

Random access files allow direct and immediate access to any part of the file without having to sequentially read through the entire file. This is particularly advantageous when you need to retrieve or modify specific records or data within the file. In contrast, other file organization methods like sequential access require reading through the file from the beginning to reach the desired location, which can be slower for large files.

So, random access files are known for their efficiency in accessing data, especially when compared to methods that involve sequential searching or scanning.