The import of plants can be dangerous as the plants may be invasive or introduce diseases to native plants and ecosystems - NSC Information Technology - Question 4 - 2020 - Paper 2
Question 4
The import of plants can be dangerous as the plants may be invasive or introduce diseases to native plants and ecosystems. A rigid testing process must first be cond... show full transcript
Worked Solution & Example Answer:The import of plants can be dangerous as the plants may be invasive or introduce diseases to native plants and ecosystems - NSC Information Technology - Question 4 - 2020 - Paper 2
Step 1
State TWO specific requirements relevant to the content of a primary key field.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The data in the primary key field must be unique, ensuring that no duplicate values exist within the field.
The primary key field cannot be null; it must contain a valid value for every record.
Step 2
Identify a suitable foreign key and give the name of the field and the name of the table that contains the field.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A suitable foreign key is ImporterID from the tblImporters table, which can be referenced in the tblApplications table to establish a relationship.
Step 3
Name the type of relationship between tables tblImporters and tblApplications.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The relationship between the tables tblImporters and tblApplications is a One-to-Many relationship.
Step 4
Name the diagram used to illustrate the relationship between the two tables.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The diagram used to illustrate the relationship is known as an Entity Relationship Diagram (ERD).
Step 5
Suggest a more appropriate data type for the Approved field in the tblApplications table.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A more appropriate data type for the Approved field would be a Boolean type, as this would more accurately reflect a true/false condition for whether an application is approved.
Step 6
Explain why the ProcessedDuration field in the tblApplications table is redundant.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The ProcessedDuration field is redundant as the duration can be calculated from the difference between the DateProcessed and DateReceived fields. Therefore, it does not need to be stored explicitly.
Step 7
Explain what is meant by the term beta version.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A beta version is typically a version of software that is made available for testing by a limited number of users before it is released in its final form. It allows for feedback and issues to be identified and resolved.
Step 8
Suggest a way in which the system can be adapted so that the name of a country is captured uniformly in the ImporterCountry field.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To ensure uniformity in country names, a drop-down list or combo box should be implemented that contains standardized country names. This limits user input to a predefined set of valid names.
Step 9
Data validation.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data validation for the Approved field would entail implementing a validation rule that restricts input to either 0 or 1, ensuring that only acceptable values are submitted.
Step 10
Data verification.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data verification involves checking the correctness of data against the source or human perspective, ensuring that the approved status matches the original intent of the application.
Step 11
Suggest any TWO physical ways in which access to the database server can be restricted.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Controlled access to the building housing the database server using biometric security methods such as NFC or RFID.
Placing servers or storage devices in a locked room or cabinet to prevent unauthorized access.
Step 12
Explain the term data independence.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data independence refers to the separation between the software that uses the database application and the actual data structure or database managed by the DBMS server, allowing changes to be made to the data structure without affecting the application.
Step 13
Name and explain ONE other area of data independence.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Logical independence allows changes to be made to the logical structure of the database without necessitating a change in the application that uses that data.