The MMA (Motorist Monitoring Agency) keeps a database on all motorist information and their offences - NSC Information Technology - Question 4 - 2022 - Paper 2
Question 4
The MMA (Motorist Monitoring Agency) keeps a database on all motorist information and their offences.
The following screenshots show the structure of two tables in... show full transcript
Worked Solution & Example Answer:The MMA (Motorist Monitoring Agency) keeps a database on all motorist information and their offences - NSC Information Technology - Question 4 - 2022 - Paper 2
Step 1
What does the key symbol to the left of the IDNumber field indicate?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The key symbol indicates that the IDNumber field is the primary key for the tblMotorists table. This means that it uniquely identifies each record in the table and cannot be duplicated.
Step 2
State TWO distinct requirements of a field designated with the key symbol, as indicated in the example above.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The primary key must be unique for each record, ensuring that no two records have the same value in this field.
The primary key cannot be null, meaning it must always contain a valid and required value.
Step 3
Which field in the tblOffences table would be best suited to establish a one-to-many relationship between the two tables?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The IDNumber field in the tblOffences table is best suited to establish a one-to-many relationship. This field references the IDNumber from the tblMotorists table, allowing multiple offences to be linked to a single motorist.
Step 4
Provide a more suitable data type for the VehicleRegNumber field AND motivate your answer.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A more suitable data type for the VehicleRegNumber field would be 'Short Text'. This is appropriate because vehicle registration numbers can contain both letters and numbers, and a textual data type allows for this combination, while also accommodating potential leading zeros.
Step 5
Provide a motivation to defend this suggestion.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Splitting the NameAndSurname field into two separate fields allows for better data normalization. This makes it easier to process, sort, and filter records based on either the name or surname independently. Additionally, it facilitates clearer reporting and data entry.
Step 6
What is data redundancy?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data redundancy refers to the unnecessary repetition of data within a database. This can lead to inconsistencies and inefficiencies, making data management more complex.
Step 7
Name the process during which the design of a database is changed to prevent anomalies from occurring due to problems, like data redundancy.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The process is known as normalization. Normalization organizes the database structure to minimize redundancy and dependency, addressing potential anomalies effectively.
Step 8
Example of useful information extracted from the data provided.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of useful information could be determining the frequency of different types of offences committed, such as identifying the most common offence recorded during the specified time period.
Step 9
Explain how Step 3 and Step 4 in the data progression diagram may be applied in practice using the information that you identified in the answer to QUESTION 4.7.1.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Step 3 (Transforming Information into Knowledge) involves analyzing the extracted information to develop insights, such as understanding peak times for specific offences. Step 4 (Making Informed Decisions) would use this knowledge to enhance policing efforts, likely focusing resources on areas and times where specific offences are more prevalent.
Step 10
Explain what fuzzy logic is and give an example, applicable to this context.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Fuzzy logic is a form of reasoning that handles the concept of partial truth, where truth values may range between completely true and completely false. For instance, in traffic management, fuzzy logic could assess a driver's behavior to determine whether they are behaving recklessly, rather than relying on strict rules that classify behavior as either safe or unsafe.
Step 11
What is SQL injection?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SQL injection is a hacking technique where malicious SQL statements are inserted into input fields, allowing attackers to manipulate the database and gain unauthorized access to sensitive information.
Step 12
What is an audit trail?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An audit trail is a record that tracks who made changes to a database and when those changes occurred. It is critical for maintaining accountability and monitoring data integrity.
Step 13
Identify the type of data integrity that is referred to in the diagram.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of data integrity referred to in the diagram is logical integrity. This ensures that the data within the database accurately represents the real-world entities it is meant to model.
Step 14
What does physical integrity of data entail?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Physical integrity of data involves protecting data against loss or corruption due to external factors such as power surges, natural disasters, or hardware failures.
Step 15
Name TWO ways to ensure the date is entered in the correct format.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Providing a user interface component, such as a date picker, to guide users in selecting valid dates.
Implementing input validation techniques, such as format checks and data type validation, to ensure proper entries.
Step 16
Explain how transaction processing is used to maintain data integrity while transactions take place.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Transaction processing is used to maintain data integrity by ensuring that all operations within a transaction are completed successfully before committing any changes. If any part of the transaction fails, the entire process is rolled back to its original state, preventing corruption and ensuring that the database remains consistent.