The tour company requires the use of a database management system to store details of tours and tour guides - NSC Information Technology - Question 4 - 2017 - Paper 2
Question 4
The tour company requires the use of a database management system to store details of tours and tour guides.
4.1 Which ONE of the following is an example of a DBMS?... show full transcript
Worked Solution & Example Answer:The tour company requires the use of a database management system to store details of tours and tour guides - NSC Information Technology - Question 4 - 2017 - Paper 2
Step 1
4.1 Which ONE of the following is an example of a DBMS?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is Oracle. It is a database management system that allows users to create, manage, and manipulate databases.
Step 2
4.2 Name TWO aspects of database design that should be addressed to ensure effective functionality.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data integrity: Ensuring the accuracy and consistency of data over its lifecycle.
Data security: Implementing measures to protect data from unauthorized access and breaches.
Step 3
4.3.1 Explain what a record in a database is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A record in a database is a collection of fields that hold data pertaining to a single entity. It represents one row of a table and includes various attributes relevant to that entity.
Step 4
4.3.2 Identify ONE field where the data type needs to be changed AND suggest a more suitable data type.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The 'StartDate' and 'EndDate' fields are currently set to text. These should be changed to a DateTime data type to accurately represent date values and enable date-based operations.
Step 5
4.3.3(a) Explain what an update anomaly is, using the tour guide Kajal Singh as an example.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An update anomaly occurs when changes to the data in one record do not propagate to all instances of that record. For instance, if Kajal Singh's telephone number changes, the information must be updated in every record where Kajal Singh appears as the tour guide; otherwise, inconsistent data will exist.
Step 6
4.3.3(b) Explain the basic steps that should be followed when the tblTours table has to be normalized.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Identify the primary keys for each entity in the table.
Ensure that each table has a primary key that uniquely identifies each record.
Split the table into multiple related tables to eliminate redundancy, ensuring a 1-to-many relationship where appropriate.
Step 7
4.3.4 What is the result after executing this statement?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Executing the statement 'DELETE FROM tblTours' will remove all records from the tblTours table but will not delete the table itself.
Step 8
4.4 Briefly explain how the use of parallel data sets prevents loss of data.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Parallel data sets are mirrored copies of data stored in different locations. If one dataset fails, the other remains accessible, thus preventing data loss and ensuring continuity.
Step 9
4.5 Explain what data mining is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data mining is the process of discovering patterns and extracting useful information from large sets of data using statistical and computational techniques. It helps organizations to make informed decisions based on data analysis.
Step 10
4.6 Explain how SQL injection can be used as a hacking tool.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SQL injection is a technique where malicious SQL code is inserted into a query, allowing an attacker to manipulate the database. It can be used to bypass authentication, retrieve or modify data without authorization, and perform destructive actions.
Step 11
4.7.1 Give TWO reasons why distributed databases are used.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Enhanced performance: By distributing the database across multiple locations, data access times can be reduced, leading to better performance.
Increased reliability: Distributed databases can offer redundancy, ensuring that data is still available even if one node fails.
Step 12
4.7.2 Name the TWO models of distributed databases that are used so that data on various servers remain up to date and synchronized.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Replicated model: Each server has a complete copy of the database, which helps in ensuring data availability and redundancy.
Partitioned model: The database is divided into segments, and each server manages its own segment, improving performance and storage efficiency.