Neco 2017 Data Processing Obj And Theory Answers – May/June Expo

image

DATA PROCESSING OBJ:
1CCACDCDEAE
11BCBDABCADD
21AABEDCECBA
31ABBABBEEAA
41DBBEBEABAB
51BDEEDEBECA
=======++==
4a)
do it your self
4bi)
log files – A log file is a recording of everything that
goes in and out of a particular server
4bii)
Firewall- A firewall is a system designed to prevent
unauthorized access to or from a private network.
4biii)
Encryption – Encryption is the conversion of
electronic data into another form, called ciphertext,
which cannot be easily understood by anyone except
authorized parties.
4biv)
Backup- backup refers to the copying and archiving of
computer data so it may be used to restore the
original after a data loss event.
4ci)
-Primary key uniquely identify a record in the table.
While,
Foreign key is a field in the table that is primary key
in another table.
-Primary Key can’t accept null values. While,
Foreign key can accept multiple null value.
4cii)
i)Vision problems

ii)Headache

1a)
1. documents can easily be send electronically
2. can use certain features like hyperlinks
3. spell /grammar check easy to erase and fix
mistakes and edit text
4. It is easier to make changes to your document .
1bi)
presentation program is a software package used to
display information in the form of a
slide show.
1c)
1. Smooth tool – Smooth object by dragging along its
outline.

2. Crop tool – Remove the areas outside a selection.

3ai)
database management system ( DBMS ) is a
computer software application that interacts with the
user, other applications, and the database itself to
capture and analyze data.
3aii)
1.Access (Jet, MSDE)
2. Adabas D
3aiii)
A file is a collection of records which have common
properties. Each file has its own file reference which
is unique. The file reference indicates the subject or
contexts of the records . A record can be an image,
text based or in electronic or physical
format.
3bi)
normalization, is the process of organizing the
columns (attributes) and tables (relations) of a
relational database to reduce data redundancy and
improve data
integrity.
3bii)
1. BCNF (Boyce – Codd Normal Form)
2. DKNF (Domain Key Normal Form)
3c)
1. Pick tool
2. Freehand Pick tool
3. Smear tool

4. Shape tool

5ai)
Information Transmission can be defined as the
process of sending, propagating and receiving of
information from one person to another in the same
remote or different location
5aii)
i)Tasks can be completed faster because computers
work at amazing speed.
ii)Computers can process large amounts of data and
generate error-free results, provided that the data is
entered correctly.
5bi)
hierarchical database modelis a data modelin which
the data is organized into a tree-like structure. The
data is stored asrecordswhich are connected to one
another throughlinks. A record is a collection of
fields, with each field containing only one value.
Theentity typeof a record defines which fields the
record contains.
ii)network modelis a database modelconceived as a
flexible way of representing objects and their
relationships. Its distinguishing feature is that the
schema, viewed as a graph in which object types are
nodes and relationship types are arcs, is not
restricted to being a hierarchy or lattice
5bii)
i)Data Dictionary Management is where the DBMS
stores definitions of the data elements and their
relationships (metadata). The DBMS uses this
function to look up the required data component
structures and relationships.
ii)Data Storage Management
This particular function is used for the storage of
data and any related data entry forms or screen
definitions, report definitions, data validation rules,
procedural code, and structures that can handle video
and picture formats.
iii)Data Transformation and Presentation This
function exists to transform any data entered into
required data structures. By using the data
transformation and presentation function the DBMS
can determine the difference between logical and
physical data formats.
iv)Database Communication Interfaces
This refers to how a DBMS can accept different end
user requests through different network
environments. An example of this can be easily
related to the internet.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s