SCENARIO
The import of plants can be dangerous as the plants may be invasive or introduce diseases to native plants and ecosystems - NSC Information Technology - Question 4 - 2020 - Paper 2
Question 4
SCENARIO
The import of plants can be dangerous as the plants may be invasive or introduce diseases to native plants and ecosystems. A rigid testing process must fir... show full transcript
Worked Solution & Example Answer:SCENARIO
The import of plants can be dangerous as the plants may be invasive or introduce diseases to native plants and ecosystems - NSC Information Technology - Question 4 - 2020 - Paper 2
Step 1
4.1.1 State TWO specific requirements relevant to the content of a primary key field.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The data in the primary key field must be unique, ensuring no duplicates are present.
The primary key field cannot be null or empty, guaranteeing that every record has a valid identifier.
Step 2
4.1.2 A foreign key field needs to be identified in order to establish a relationship between the tables.
(a) Identify a suitable foreign key and give the name of the field and the name of the table that contains the field.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A suitable foreign key is ImporterID, which will be located in the tblApplications table. This field will reference the primary key ImporterID from the tblImporters table.
Step 3
(b) Name the type of relationship between tables tblImporters and tblApplications.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of relationship between tblImporters and tblApplications is a One-to-Many relationship, where one importer can have multiple applications.
Step 4
4.1.3 Name the diagram used to illustrate the relationship between the two tables.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The diagram used to illustrate the relationship between the two tables is called an Entity Relationship Diagram (ERD).
Step 5
4.2 Suggest a more appropriate data type for the Approved field in the tblApplications table.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A more appropriate data type for the Approved field could be a Boolean type, which can store values such as True/False to indicate the approval status.
Step 6
4.3 Explain why the ProcessedDuration field in the tblApplications table is redundant.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The ProcessedDuration field is redundant because it can be calculated by subtracting the DateReceived from the DateProcessed. Thus, storing it as a separate field is unnecessary.
Step 7
4.4.1 Explain what is meant by the term beta version.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A beta version refers to a release of software that is made available for testing, typically to a limited user base. It serves as a trial version before the final release.
Step 8
4.4.2 Suggest a way in which the system can be adapted so that the name of a country is captured uniformly in the ImporterCountry field.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To ensure uniformity in capturing country names, implementing a dropdown list or combobox with predefined country names can restrict user input to valid options, preventing variations.
Step 9
4.5.1 Data validation.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data validation involves ensuring that the data entered in the Approved field adheres to predetermined rules, such as allowing only 0 or 1 as valid inputs.
Step 10
4.5.2 Data verification.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data verification involves checking the correctness of the data against the source or user perspective, ensuring that the values entered match actual approvals.
Step 11
4.6 Suggest any TWO physical ways in which access to the database server can be restricted.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Controlled access to buildings using biometric security, such as NFC or RFID systems, can limit physical access to the server location.
Placing servers or storage devices in a locked room or cabinet is another effective way to restrict access.
Step 12
4.7.1 Explain the term data independence.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data independence refers to the separation between the database application and the actual data structure managed by the Database Management System (DBMS), allowing changes to be made to the data without affecting the applications.
Step 13
4.7.2 Name any ONE level of data independence.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One level of data independence is logical independence, which allows changes to the logical schema without altering the database applications.
Step 14
4.7.3 Any TWO.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The user/software/application cannot alter the structure or format of the data without affecting the DBMS.
Multiple applications can interface with the same data because the physical structure is not hard-coded, allowing flexibility in data management.