REcent

NECO 2017 Data Processing Obj And Essay Answer – June/July Expo

NECO Data Processing OBJ, Theory And Essay Questions and Answer – June/July 2017 Expo Runz

DATA PROCESSING OBJ:
1-10: CCACDCDEAE
11-20: BCBDABCADD
21-30: AABEDCECBA
31-40: ABBABBEEAA
41-50: DBBEBEABAB
51-60: BDEEDEBECA

THEORY

(1a)
(i) Enable one to create document and store it electronically on a disk
(ii)Enable one to display a document on the screen
(iii) error edited by deleting not noticeable
(iv) extra copies are equally original and there is no limit to the number that can be printed
(vi) Document score in the computer storage can be retrieved and edited by different users

(1bi)
Presentation package are computer software package that are used to display information usually in the form of a slide show. Example is Microsoft power point

(1bii)
Web design package:
It is used in designing websites
Presentation package:
It is used in creating slides

(1ci)
Pick tool
(i)for selecting objects
(ii)for moving and rotating objects

Shape tool
(i)foDREAMWEAVER
he shape of diagramming objects and text

(1cii)
Multi-user operating system – – UNIX
Open source software – – LINUX
Utility program – – CORAL DRAW
Web design package – – ADOBE DREAMWEAVER
(3a)
software that handles the storage, retrieval, and updating of data in a computer system.

3aii)
MySQL
Microsoft Access

3aiii)
A file is a collection of records which have common properties. Each file has its own file reference which is unique. The file reference indicates the subject or contexts of the records.
While
A record can be an image, text based or in electronic or physical format.

3bi) Normalization is a process of organizing the data in database to avoid data redundancy, insertion anomaly , update anomaly & deletion anomaly

3Bii)
*Insertion Anomalies:Insertion anomalies occur when we
try to insert data into a flawed table.
*Deletion Anomalies:- Deletion anomalies occur when we
delete data from a flawed schema.
*Update Anomalies:- Update anomalies occur when we
change data in a flawed schema.

3c.
Pick tool
Shape tool
Zoom tool
Freehand tool

4b) log files – A log file is a recording of everything that goes in and out of a particular server

Firewall- A firewall is a system designed to prevent unauthorized access to or from a private network.

Encryption – Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.

Backup- backup refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event.

4ci)
Primary key uniquely identify a record in the table. While,
Foreign key is a field in the table that is primary key in another table.

Primary Key can’t accept null values. While,
Foreign key can accept multiple null value.

4cii) Vision problems
Headache
Obesity

5ai)
Information Transmission can be defined as the process of sending, propagating and receiving of information from one person to another in the same remote or different location
5aii)
i)Tasks can be completed faster because computers work at amazing speed.
ii)Computers can process large amounts of data and generate error-free results, provided that the data is entered correctly.
5bi)
hierarchical database modelis a data modelin which the data is organized into a tree-like structure. The data is stored asrecordswhich are connected to one another throughlinks. A record is a collection of fields, with each field containing only one value. Theentity typeof a record defines which fields the record contains.
ii)network modelis a database modelconceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice
5bii)
i)Data Dictionary Management is where the DBMS stores definitions of the data elements and their relationships (metadata). The DBMS uses this function to look up the required data component structures and relationships.
ii)Data Storage Management
This particular function is used for the storage of data and any related data entry forms or screen definitions, report definitions, data validation rules, procedural code, and structures that can handle video and picture formats.
iii)Data Transformation and Presentation This function exists to transform any data entered into required data structures. By using the data transformation and presentation function the DBMS can determine the difference between logical and physical data formats.
iv)Database Communication Interfaces
This refers to how a DBMS can accept different end user requests through different network environments. An example of this can be easily related to the internet.

Search

1 Comment on NECO 2017 Data Processing Obj And Essay Answer – June/July Expo

  1. thank very thanks too you

Leave a comment

Your email address will not be published.