Explain three methods used to detect input errors. (Answered)
Describe the following file organization methods:
i) Sequential
ii) Indexed sequential
iii) Random. (Answered)
Describe using examples the following computational errors.
i) Overflow
ii) Truncation
iii) Rounding off. (Answered)
Describe any stages of data collection. (Answered)
List two qualities of good information. (Answered)
Explain three common operations carried out on files. (Answered)
List three file organization methods. (Answered)
State two characteristics of a master file. (Answered)
Front-end processor are quite useful in real time systems. State any three reasons why they are important. (Answered)
Mention five characteristics of real-time system. (Answered)
Define the term real-time processing. (Answered)
List four stages of data processing cycle. (Answered)
State five possible ways of protecting data integrity (Answered)
Explain three ways in which data integrity is measured. (Answered)
State four advantages of computerized filing system over the traditional one. (Answered)
Distinguish between online processing and real time processing. Give an application area of each. (Answered)
With the aid of an example, describe the following data processing modes.
a) Batch processing
b) Timesharing processing
c) Distributed processing
(Answered)
Explain how a random file is accessed. (Answered)
State two disadvantages of random file organization method as used in microcomputers. (Answered)
Name the file organization method used in microcomputer. (Answered)
List three areas where on-line processing could be used. In each area, mention how is used. (Answered)
State two differences between batch processing and on-line processing. (Answered)
List three types of data processing files and their functions. (Answered)
Define the term computer file. (Answered)
State one appropriate storage media for each of the following file organization methods:
a) Serial
b) Random (Answered)
List three methods of data entry into a computer. (Answered)
List four possible causes of loss of data integrity. (Answered)
List three factors that determine the methods of data access in a computer. (Answered)
State a situation where these error checking methods are appropriate in data processing:
a) Check digit
b) Parity check (Answered)
Explain three major elements of a computer file. (Answered)
State the purpose of the following files and give examples where each may be required in a school:
a) Back-up file.
b) Report file. (Answered)
Differentiate between sequential file and serial file organization methods. (Answered)
Differentiate between file organization and file access. (Answered)
Mention two advantages and two disadvantages of multiprocessing. (Answered)
Mention the mode of processing that is suitable for the following;
a) Booking vehicles,
b) Payroll processing. (Answered)
Give one area where distributed processing is used. (Answered)
State two disadvantages of distributed systems. (Answered)
State two disadvantages of real time processing. (Answered)
Explain two advantages of batch processing. (Answered)
Define batch processing. (Answered)
State two benefits of a harsh (random) access file. (Answered)
Distinguish between master file and transaction file. (Answered)
Define these terms:
i) Data logging
ii) Interactive processing. (Answered)
Mention three validation checks that can be carried out on data during data input. (Answered)
Differentiate between data validation and data verification. (Answered)
State four factors to consider when choosing a mode of data processing. (Answered)
Distinguish between index sequential and non-index sequential file access methods. (Answered)
List two types of transcription error. (Answered)
Define the term transcription error as used in data processing. (Answered)
List four parameters that measures data integrity. (Answered)