You are on page 1of 1

 FILE ORGANIZATION

1. Define file organization


DATA PROCESSING MIDTERM TEST
2. List four types of file organization
CREATING AND MODIFYING RELATION USING SQL
3. Outline five factors to be considered before choosing a file
QUESTIONS. organization
1. Explain SQL
 INTERNET
2. What is constraints?
1. Define internet
3. List six data types
2. List 4 example of web browser
4. CREATE A DATABASE LET THE NAME BE ; ssonedatabase and
3. List some common features of web browser
create a table with the following field;
4. List 6 advantages of internet
Firstname, last name, address, phone no,dofb, gender,Id
5. List 7 abuses of internet
Create a primary key with the Id, and insert a constraint that will
6. Explain the following
check the gender to be only female. Each field must not be empty
1. Malicious software
in the table.
2. Denial of service attack
Populate your table. From the table created update a record of
3. SQL injection
your choice.
4. Phishing

1 2

FILE ORGANIZATION
1. Define file organization
DATA PROCESSING MIDTERM TEST 2. List four types of file organization
CREATING AND MODIFYING RELATION USING SQL 3. Outline five factors to be considered before choosing a file
QUESTIONS. organization
1. Explain SQL INTERNET
2. What is constraints? 1. Define internet
3. List six data types 2. List 4 example of web browser
4. CREATE A DATABASE LET THE NAME BE ; ssonedatabase and 3. List some common features of web browser
create a table with the following field; 4. List 6 advantages of internet
Firstname, last name, address, phone no,dofb, gender,Id 5. List 7 abuses of internet
Create a primary key with the Id, and insert a constraint that will 6. Explain the following
check the gender to be only female. Each field must not be empty a) Malicious software
in the table. b) Denial of service attack
Populate your table. From the table created update a record of c) SQL injection
your choice. d) Phishing
2
1

FILE ORGANIZATION
1.
Define file organization
DATA PROCESSING MIDTERM TEST 2.
List four types of file organization
CREATING AND MODIFYING RELATION USING SQL 3.
Outline five factors to be considered before choosing a file
QUESTIONS. organization
1. Explain SQL INTERNET
2. What is constraints? 1. Define internet
3. List six data types 2. List 4 example of web browser
4. CREATE A DATABASE LET THE NAME BE ; ssonedatabase and 3. List some common features of web browser
create a table with the following field; 4. List 6 advantages of internet
Firstname, last name, address, phone no,dofb, gender,Id 5. List 7 abuses of internet
Create a primary key with the Id, and insert a constraint that will 6. Explain the following
check the gender to be only female. Each field must not be empty a. Malicious software
in the table. b. Denial of service attack
Populate your table. From the table created update a record of c. SQL injection
your choice. d. Phishing 2
1
 FILE ORGANIZATION
1. Define file organization
DATA PROCESSING MIDTERM TEST 2. List four types of file organization
CREATING AND MODIFYING RELATION USING SQL 3. Outline five factors to be considered before choosing a file
QUESTIONS. organization
1. Explain SQL INTERNET
2. What is constraints? 1. Define internet
3. List six data types 2. List 4 example of web browser
4. CREATE A DATABASE LET THE NAME BE ; ssonedatabase and 3. List some common features of web browser
create a table with the following field; 4. List 6 advantages of internet
Firstname, last name, address, phone no,dofb, gender,Id 5. List 7 abuses of internet
Create a primary key with the Id, and insert a constraint that will 6 Explain the following
check the gender to be only female. Each field must not be empty a. Malicious software
in the table. b. Denial of service attack
Populate your table. From the table created update a record of c. SQL injection
your choice. d. Phishing
2
1

You might also like