The MMA (Motorist Monitoring Agency) keeps a database on all motorist information and their offences - NSC Information Technology - Question 4 - 2022 - Paper 2
Question 4
The MMA (Motorist Monitoring Agency) keeps a database on all motorist information and their offences.
The following screenshots show the structure of two tables in ... show full transcript
Worked Solution & Example Answer:The MMA (Motorist Monitoring Agency) keeps a database on all motorist information and their offences - NSC Information Technology - Question 4 - 2022 - Paper 2
Step 1
What does the key symbol to the left of the IDNumber field indicate?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The key symbol indicates that the IDNumber field is a primary key. A primary key uniquely identifies each record in a database table.
Step 2
State TWO distinct requirements of a field designated with the key symbol, as indicated in the example above.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The primary key must be unique for each record in the table, ensuring that no two records can have the same value in this field.
The primary key cannot contain null values; every record must have a valid value for this field.
Step 3
Which field in the tblOffences table would be best suited to establish a one-to-many relationship between the two tables?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The best-suited field in the tblOffences table to establish a one-to-many relationship with the tblMotorists table is the IDNumber field. Each motorist can have multiple offences, while each offence is linked to a single motorist.
Step 4
Provide a more suitable data type for the VehicleRegNumber field AND motivate your answer.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The suitable data type for the VehicleRegNumber field is Short Text. This is appropriate because vehicle registration numbers contain both letters and numbers, which cannot be accommodated by numeric data types.
Step 5
Provide a motivation to defend this suggestion.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Separating the name into two fields (Name and Surname) provides greater flexibility in data handling and reporting. It allows for easier sorting, filtering, and searching within the database, and ensures that each element of the name can be used individually in various applications.
Step 6
What is data redundancy?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data redundancy refers to the unnecessary repetition of data within a database, which can lead to inconsistencies and inefficiencies in data management.
Step 7
Name the process during which the design of a database is changed to prevent anomalies from occurring due to problems, like data redundancy.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The process is known as normalization. Normalization involves organizing the database structure to reduce redundancy and improve data integrity.
Step 8
Give an example of useful information that can be extracted from the data provided.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of useful information is establishing the frequency of offences, such as identifying the most common type of offence recorded within a specific timeframe.
Step 9
Explain how Step 3 and Step 4 in the data progression diagram may be applied in practice using the information that you identified in the answer to QUESTION 4.7.1.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Step 3, which involves transforming information into knowledge, could be applied by analyzing the frequency of offences to develop strategies for increasing police enforcement in areas with high occurrences. Step 4 would involve making informed decisions based on this analysis, such as allocating more resources to traffic control at hotspots identified in Step 3.
Step 10
Explain what fuzzy logic is and give an example applicable to this context.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Fuzzy logic deals with reasoning that is approximate rather than fixed and exact. An example in the context of traffic management might be evaluating drivers who frequently skip stop signs and categorizing them as 'high-risk' drivers even if they do not exhibit reckless driving in every instance.
Step 11
What is SQL injection?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SQL injection is a hacking technique where malicious SQL statements are inserted into input fields, allowing attackers to manipulate the underlying database.
Step 12
What is an audit trail?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An audit trail is a record that keeps track of who made changes to a database and when those changes were made, helping ensure accountability and transparency in data management.
Step 13
Identify the type of data integrity that is referred to in the diagram.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of data integrity referred to in the diagram is logical integrity, which ensures that the data within a database is accurate and consistent.
Step 14
What does physical integrity of data entail?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Physical integrity of data pertains to the protection of data against physical threats, such as power surges, hardware failures, and natural disasters, ensuring that data remains intact and recoverable.
Step 15
Name TWO ways in which a programmer can ensure that the date of an offence is entered in the correct format.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Providing a user interface component, such as a date picker or calendar, to facilitate the correct input of date values.
Implementing format checks and validation rules to ensure the inputted date follows the expected format.
Step 16
Explain how transaction processing is used to maintain data integrity while transactions take place.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Transaction processing ensures that all parts of a transaction are completed successfully before committing changes to the database. If any part fails, the entire transaction is rolled back to maintain data integrity, preventing incomplete or erroneous data entries.