Photo AI

A charity called Animal Help has a website that allows people to raise funds through sponsorship - Scottish Highers Computing Science - Question 13 - 2019

Question icon

Question 13

A-charity-called-Animal-Help-has-a-website-that-allows-people-to-raise-funds-through-sponsorship-Scottish Highers Computing Science-Question 13-2019.png

A charity called Animal Help has a website that allows people to raise funds through sponsorship. Details entered are stored in a relational database. Fundraisers ... show full transcript

Worked Solution & Example Answer:A charity called Animal Help has a website that allows people to raise funds through sponsorship - Scottish Highers Computing Science - Question 13 - 2019

Step 1

State two functional requirements of the relational database.

96%

114 rated

Answer

  1. The database must allow fundraisers to view a summary of total donations received from all sponsors.
  2. The database should enable Animal Help to generate reports on the total funds raised through sponsorship.

Step 2

Draw an entity-relationship diagram to show the relationships that exist in the database.

99%

104 rated

Answer

The diagram should include three entities: Fundraiser, Donation, and Sponsor. Connect them as follows:

  • Fundraiser (1) -- (N) Donation: A fundraiser can have multiple donations.
  • Sponsor (1) -- (N) Donation: A sponsor can sponsor multiple donations. Show the cardinalities and link them appropriately.

Step 3

Select clause with fundraiserID field and average aggregate function with amount field.

96%

101 rated

Answer

SELECT fundraiserID, AVG(amount) AS 'Average Donation (£)'
FROM Donation
GROUP BY fundraiserID;

Step 4

Aggregate function should be MAX(A) / no alias implemented (Largest donation (£)).

98%

120 rated

Answer

SELECT fundraiserID, MAX(amount) AS 'Largest donation (£)'
FROM Donation
GROUP BY fundraiserID;

Step 5

Describe how encryption is used to ensure the secure transmission of data.

97%

117 rated

Answer

Encryption ensures the secure transmission of data by transforming the data into an unreadable format before it is transmitted over a network. This process involves the use of algorithms and cryptographic keys, which only authorized parties possess, allowing them to decrypt the data upon receipt. This methodology protects sensitive information, such as payment details, from unauthorized access during transmission.

Join the Scottish Highers students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;