NOUN TMA Solutions: CIT381 - File Processing and Management

Use past TMAs to deal with new TMAs and Exams
Adele
Posts: 435
Joined: Mon Nov 06, 2017 3:24 pm
Contact:

NOUN TMA Solutions: CIT381 - File Processing and Management

Postby Adele » Thu Jul 12, 2018 9:18 am

NOUN TMA Solutions: CIT381 - File Processing and Management

Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites

Q1 Which of the following defnitions best describes spelling and grammar check?

Look for spelling and grammatical errors

Q2 Which of the following defnitions best describes batch totals?

Check for missing records

Q3 Which of the following defnitions best describes check digits?

Used for numerical data

Q4 Which of the following defnitions best describes range check?

Checks that the data lie wi thin a specified range of values

Q5 Data validation uses routines called

Validation rules

Q6 What are the two forms of informed search

Adversarial search and constraint satis faction

Q7 Which of the following is not an uninformed search algorithm?

Adversarial search

Q8 What are the two types of search algorithm?

uninformed and infromed search

Q9 Which of the following is not a type of sorting algorithm?

Fast sort

Q10 A sorting algorithm is a_________________________________________________

prescribed set of well-defined rules or instructions that puts elements of a list in a certain order

Q11 Which of the following is a validation criterion?

Size

Q12 What are the two steps involves when checking for data validation?

Input, update

Q13 Which of the following is a type of uninformed search algorithm?

Tree search

Q14 Which of the following is not a type of sorting algorithm?

spatial file mana ger

Q15 Which of the following is an exmple of spatial file manager?

Amiga's workbench

Q16 Which of the following is not an example of navigational manager?

Microsoft excel

Q17 What term best suits this definition- the description of the data stored in a database

Data Dictionary

Q18 What term best suits this definition- errors in computer data that occur during transmission or retrieval, introducing unintended changes to the original data

Data Corrup tion

Q19 Which of the following is not a type of validation method?

Security check

Q20 Which of the following is not a method of managing files in Windows Operating System?

By saving my computer






Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites



Adele
Posts: 435
Joined: Mon Nov 06, 2017 3:24 pm
Contact:

Re: NOUN TMA Solutions: CIT381 - File Processing and Management

Postby Adele » Thu Jul 12, 2018 9:26 am

Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites


Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites


Q21 In variable-length spanned blocking, variable-length records are
used___________________________________________

and are packed into blocks with no unused space

Q22 In fixed blocking, fixed-length records are used

and an integral number of records are stored in a block

Q23 In variable-length unspanned blocking, variable-length records are
used_____________________________________________

but spanning is not employed

Q24 Which of the following is a category of intruders?

Snooping by insi ders

Q25 What is password protection?

A scheme that associates a passwo rd to each file

Q26 What is a worm?

A worm is a proces s that uses the spawn mechanism to ravage system performance

Q27 User authentication is generally based on one or more of three items. The items include:

User possession, user knowledge and user attrib utes

Q28 Which of the following is a method through which intrusion can be detected

Auditing and Logging

Q29 What is intrusion?

A set of actions that attempt t o compromise the integrity, confidentiality, or availability of any resource on a computing platform.

Q30 Which of the following is not part of the 4 four levels at which security measures are taken?

Softwar e

Q31 What are the two types of backup techniques?

Full and incremental dump

Q32 Which of the following is a technique for improving system reliability?

Bad Block Management

Q33 Which of the following are the methods of improving system performance?

Block caching and reduction in disk motion

Q34 Which of the following is not a method of blocking?

Fixed-Length Unspanned Blocking

Q35 Which of the following is not a type of system threat?

Disease

Q36 Which of the following is not a level of system protection?

Performa nce

Q37 What are the three types of programme threats?

Trojan horses, Trap doors, stack and buffer overflow

Q38 Which of the following is not a type of file protection?

Trojan horse

Q39 Which of the following is a way of authenticating users?

Passwords

Q40 Which of the following is not a technique used in free space management?

disk quot as


Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites
Adele
Posts: 435
Joined: Mon Nov 06, 2017 3:24 pm
Contact:

Re: NOUN TMA Solutions: CIT381 - File Processing and Management

Postby Adele » Thu Jul 12, 2018 9:28 am

Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites




Q41 Which of the operations supported by the file management system inserts a new record into the file?

Insert _One

Q42 Which of the operations supported by the file management system deletes an existing record?

Delete_One

Q43 Which of the operations supported by the file management system requires the retrieval of all the records of the file?

Retrieve _All

Q44 Which of the operations supported by the file management system requires the retrieval of a record, update of one or more of its fields, and rewrite of the updated record back into the file?

Update_One

Q45 Which of the following is not a type of access right?

writin g

Q46 Which of the folowing is a directory operation?

create a file

Q47 Which of the following is not a file operation?

amending a file

Q48 Which of the following is an element o a file directory?

file nam e

Q49 Which of the following is not an objective of the file manangement system?

Consistency

Q50 What is the difference betweeen the file extensions .mpg and .mpeg?

no difference

Q51 What does .rtf stand for?

rich text format

Q52 What does .pdf stand for?

portable document format

Q53 Which of the following is not a file name extension

.gix

Q54 Files are __________________

abstaraction mech anisms

Q55 A field is the basic_____________

element of data

Q56 Which of the following is correct?

The append call is a restricted form o f WRITE call


Q57 Which of the following different groups of users connot be granted access rights?

Writer

Q58 Which of the operations supported by the file management system requires the retrieval of just a single record.

Retrieve _O ne

Q59 A file consists of________________

a number of records

Q60 Which of the following is not a file oroganisation method?

single level directory




Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites
Adele
Posts: 435
Joined: Mon Nov 06, 2017 3:24 pm
Contact:

Re: NOUN TMA Solutions: CIT381 - File Processing and Management

Postby Adele » Thu Jul 12, 2018 9:31 am

Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites


Q61 The size of a file is measured in

byte s

Q62 The following characters can be used to name a file except

*

Q63 Which of the following is not one of the objectives of File Management system

Hacking

Q64 The only way that a user may access files is through the ____
File Management system
Index file
Sequentia l file
***All of the optio ns

Q65 Which of the following is/are the types of operations that may be performed on the directory (i) Search (ii) Create file (iii) Create directory (iv) List directory

(i), (ii) and (iv) only

Q66 The __________ greatly reduced the time required to access a simple record, without sacrificing the sequential nature of the file

Indexed sequen tial file

Q67 __________ are used mostly in applications where data are rae=rely processed exhaustivel

Indexed file

Q68 The __________ maintains the key charateristic of the sequential file: Records are organized in sequence based on a key field

Indexed sequen tial file

Q69 A ____ is collection of related fields that can be treated as a unit by some application program

Recor d

Q70 A _____ is the basic element of data where individual field contains a single value, such as an employees last manr, a data or the value of the sensor reading

Field

Q71 The process of transfering files from a computer on the Internet to your computer is called

Downloading

Q72 The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called

Computer F orensics

Q73 To move a copy of file from one computer to another over a communication channel is called

File transfer

Q74 When a file is saved for the first time?

It must be given a name to ident ify it

Q75 You organize files by storing them in

Folders

Q76 A relative path name begins at the:

Curre nt directory

Q77 An absolute path name begins at the :

root

Q78 The file name is generally split into two parts

Extension &nam e

Q79 A file is a/an _____ data type

Abstract

Q80 Properly arranged data is called

Inform ation





Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites


Who is online

Users browsing this forum: No registered users and 4 guests