WELCOME TO BLACKLOADED

NEWS | SPORTS | CELEBRITY GIST | MIXTAPE | COMEDY VIDEOS | JOKES | EDU | FASHION | IGC RECORD LABEL

PROMOTE MUSIC | ADVERTISE | INSTAGRAM LINK

Featured post

💌(£~BlackAfrica)-23/24 O' LEVEL EXPO✅

💌(£~BlackAfrica)-23/24 O' LEVEL EXPO✅ 📚(Black🌍BOMB💣) provides professional academic help customblogspotized to your requirements, gu...

JOIN US ON FACEBOOK

Latest Posts

  • Neco 2017 Data Processing Obj And Theory Answers – May/June Expo
  • Data PROCESSING QUESTION AND ANSWERS NOW 100% VERIFY. @ blackloaded

    QUESTIONS AND ANSWERS
    DATA PROCESSING OBJ:

    1-10: CCACDCDEAE

    11-20: BCBDABCADD

    21-30: AABEDCECBA

    31-40: ABBABBEEAA

    41-50: DBBEBEABAB

    51-60: BDEEDEBECA

    1a)
    1. documents can easily be send electronically
    2. can use certain features like hyperlinks
    3. spell /grammar check easy to erase and fix mistakes and edit text
    4. It is easier to make changes to your document .
    1bi)
    presentation program is a software package used to display information in the form of a
    slide show.
    1c)
    1. Smooth tool – Smooth object by dragging along its outline.
    2. Crop tool – Remove the areas outside a selection.
    ===================

    (3a)
    This is the software that handles the storage, retrieval, and updating of data in a computer system.
    (3aii)
    MySQL
    Microsoft Access
    (3aiii)
    A file is a collection of records which have common properties. Each file has its own file reference which is unique. The file reference indicates the subject or contexts of the records.
    While
    A record can be an image, text based or in electronic or physical format.
    (3bi) Normalization is a process of organizing the data in database to avoid data redundancy, insertion anomaly , update anomaly & deletion anomaly
    (3bii)
    -Insertion Anomalies: Insertion anomalies occur when we
    try to insert data into a flawed table.
    -Deletion Anomalies: Deletion anomalies occur when we
    delete data from a flawed schema.
    -Update Anomalies: Update anomalies occur when we
    change data in a flawed schema.
    (3c)
    Pick tool
    Shape tool
    Zoom tool
    Freehand tool
    =================================

    4a)
    do it your self

    (4b)
    Log files – A log file is a recording of everything that goes in and out of a particular server
    Firewall- A firewall is a system designed to prevent unauthorized access to or from a private network.
    Encryption – Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.
    Backup- backup refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event.
    (4ci)
    (i)
    Primary key uniquely identify a record in the table. While,
    Foreign key is a field in the table that is primary key in another table.
    (ii)
    Primary Key can’t accept null values. While,
    Foreign key can accept multiple null value.
    (4cii)
    Vision problems
    Headache
    Obesity
    =================================

    5ai)
    Information Transmission can be defined as the process of sending, propagating and receiving of information from one person to another in the same remote or different location
    5aii)
    i)Tasks can be completed faster because computers work at amazing speed.
    ii)Computers can process large amounts of data and generate error-free results, provided that the data is entered correctly.
    5bi)
    hierarchical database modelis a data modelin which the data is organized into a tree-like structure. The data is stored asrecordswhich are connected to one another throughlinks. A record is a collection of fields, with each field containing only one value. Theentity typeof a record defines which fields the record contains.
    ii)network modelis a database modelconceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice
    5bii)
    i)Data Dictionary Management is where the DBMS stores definitions of the data elements and their relationships (metadata). The DBMS uses this function to look up the required data component structures and relationships.
    ii)Data Storage Management
    This particular function is used for the storage of data and any related data entry forms or screen definitions, report definitions, data validation rules, procedural code, and structures that can handle video and picture formats.
    iii)Data Transformation and Presentation This function exists to transform any data entered into required data structures. By using the data transformation and presentation function the DBMS can determine the difference between logical and physical data formats.
    iv)Database Communication Interfaces
    This refers to how a DBMS can accept different end user requests through different network environments. An example of this can be easily related to the internet.

    Refresh every minutes

    Don't forget to publish your comments

    Posted by Tblogger 8/6/2017

    No comments:

    Post a Comment

    Comments here