Photo AI

The Internet café must keep records of the users and be able to charge users for the time that they were logged onto the Internet - NSC Information Technology - Question 4 - 2016 - Paper 2

Question icon

Question 4

The-Internet-café-must-keep-records-of-the-users-and-be-able-to-charge-users-for-the-time-that-they-were-logged-onto-the-Internet-NSC Information Technology-Question 4-2016-Paper 2.png

The Internet café must keep records of the users and be able to charge users for the time that they were logged onto the Internet. A database for this purpose has be... show full transcript

Worked Solution & Example Answer:The Internet café must keep records of the users and be able to charge users for the time that they were logged onto the Internet - NSC Information Technology - Question 4 - 2016 - Paper 2

Step 1

Motivate the choice of radio buttons for the Gender option.

96%

114 rated

Answer

The use of radio buttons for the Gender option is appropriate because:

  1. Only one option can be selected at a time, which is sensible for identifying a user's gender.
  2. It provides specific valid options (Male, Female), making data entry clearer and quicker for users, eliminating potential typing errors.

Step 2

Without changing the label, suggest ONE way in which the GUI could be changed to indicate the format in which the user should enter the time.

99%

104 rated

Answer

One way to indicate the format for entering time is by using two combo boxes; one for selecting hours (0-23) and another for minutes (0-59). This would guide the user toward entering a valid time format without altering the existing label.

Step 3

Explain the difference between valid data and correct data.

96%

101 rated

Answer

Valid data refers to data that fits within the established rules, such as a time value that is within the range of 0 to 24 hours. Correct data, on the other hand, refers to data that accurately reflects the real-world value; for example, if a user enters '25:00' as the time, it is valid (within the range) but incorrect as it does not represent a legitimate time.

Step 4

Indicate how the tables above could be linked so that a one-to-many relationship can be formed.

98%

120 rated

Answer

The tblComputers table has a unique identifier for each computer, 'ComputerNumber', that can serve as a primary key. The tblUsers table should have a foreign key that references this 'ComputerNumber' to create a one-to-many relationship, where one computer can be associated with multiple users.

Step 5

Display the logout time of the users who paid with debit cards in sequential order.

97%

117 rated

Answer

The SQL code to retrieve the logout time for users who paid with debit cards is as follows:

SELECT LogoutTime
FROM tblUsers
WHERE PaymentMethod = 'Debit Card'
ORDER BY LogoutTime;

Step 6

Change the payment method for 73110117564076 to 'Credit Card'.

97%

121 rated

Answer

The SQL code to update the payment method is:

UPDATE tblUsers
SET PaymentMethod = 'Credit Card'
WHERE UserIDNo = '73110117564076';

Step 7

Display the number of users who paid with cash. The number of users must be displayed in a field called CountCashIds.

96%

114 rated

Answer

The SQL code to count the number of users who paid with cash is:

SELECT COUNT(UserIDNo) AS CountCashIds
FROM tblUsers
WHERE PaymentMethod = 'Cash';

Step 8

Display a list of users who logged in after 12:00 on 2016/02/25.

99%

104 rated

Answer

The SQL code to display users logged in after 12:00 on a specific date is:

SELECT *
FROM tblUsers
WHERE (LoginTime > '12:00')
AND (LoginDate = '2016/02/25');

Step 9

State the basic information that is captured during an audit trail.

96%

101 rated

Answer

An audit trail captures essential information such as:

  1. Records of actions performed on the database (e.g., insertions, deletions, updates).
  2. User identity who made changes to the database.
  3. Timestamp of when changes were made.

Step 10

Indicate TWO ways in which data is captured invisibly.

98%

120 rated

Answer

Data can be captured invisibly through methods such as:

  1. Using credit cards or loyalty cards during purchases, which records transaction data automatically.
  2. Tracking user activity when browsing websites, allowing for data collection without user consent being explicitly required.

Step 11

What is this process called?

97%

117 rated

Answer

The process of using sophisticated software to determine patterns in data statistically is called 'Data Mining'.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;