Photo AI

4.1 A loyalty program at stores is a way in which invisible data capturing can take place - NSC Information Technology - Question 4 - 2022 - Paper 2

Question icon

Question 4

4.1-A-loyalty-program-at-stores-is-a-way-in-which-invisible-data-capturing-can-take-place-NSC Information Technology-Question 4-2022-Paper 2.png

4.1 A loyalty program at stores is a way in which invisible data capturing can take place. 4.1.1 Give another example of invisible data captured about a customer du... show full transcript

Worked Solution & Example Answer:4.1 A loyalty program at stores is a way in which invisible data capturing can take place - NSC Information Technology - Question 4 - 2022 - Paper 2

Step 1

4.1.1 Give another example of invisible data captured about a customer during purchases, other than their personal details such as name, surname and address.

96%

114 rated

Answer

An example of invisible data capturing could be purchasing habits or preferences, such as the time of day when a customer typically shops, or the types of products they usually buy.

Step 2

4.1.2 Give ONE reason why a company would want to capture invisible data on the purchases made by cardholders.

99%

104 rated

Answer

A company might want to capture invisible data to anticipate the needs of their clients, allowing them to stock products that better meet customer preferences.

Step 3

4.1.3 Except for card readers and credit cards, name TWO other mechanisms of invisible data capturing.

96%

101 rated

Answer

Two other mechanisms can include online activities such as web searches and purchases, and GPS navigation data through mapping services.

Step 4

4.2.1 State TWO ways of ensuring the validity of captured data.

98%

120 rated

Answer

Two ways to ensure the validity of captured data are: (1) Format check - ensuring data follows a specific format, and (2) Data type check - verifying that the data is of the expected type.

Step 5

4.2.2 How can two customers with the same name and surname be distinguished in the database?

97%

117 rated

Answer

Two customers with the same name and surname can be distinguished by assigning a unique primary key to each customer, such as a Customer ID.

Step 6

4.3.1 (a) What is the term given to the unnecessary repetition of data across multiple records?

97%

121 rated

Answer

The term for the unnecessary repetition of data across multiple records is data redundancy.

Step 7

4.3.1 (b) An update anomaly can occur when data is repeated unnecessarily. Explain how an update anomaly takes place.

96%

114 rated

Answer

An update anomaly occurs when changes to a single piece of information require multiple records to be updated. If one instance is updated and others are not, it leads to inconsistencies in the data.

Step 8

4.3.2 (a) Identify the type of relationship presented in the diagram: Worker ↔ Job.

99%

104 rated

Answer

The relationship is a One-to-Many relationship, as typically multiple workers can perform a single job.

Step 9

4.3.2 (b) Identify the type of relationship presented in the diagram: Company ↔ Customers.

96%

101 rated

Answer

The relationship is also a One-to-Many relationship since a company can have many customers, but each customer typically belongs to one company.

Step 10

4.4.1 Name the type of key formed when multiple fields are used together as the primary key.

98%

120 rated

Answer

This key is referred to as a Composite or Compound key.

Step 11

4.4.2 Suggest another key field that can be created in tblCollections instead of using the three fields as the primary key.

97%

117 rated

Answer

Another suitable key field might be CollectionNumber or an autonumber field.

Step 12

4.4.3 What will the data type of the primary key field in table tblClients be?

97%

121 rated

Answer

The data type of the primary key field in table tblClients will be Short Text, as it will contain identifiers like Client IDs.

Step 13

4.4.4 Explain the term referential integrity.

96%

114 rated

Answer

Referential integrity ensures that relationships between tables remain consistent by enforcing rules that require foreign keys in one table to match primary keys in another, preventing orphan records.

Step 14

4.4.5 (a) Multiple copies of the data are kept.

99%

104 rated

Answer

True

Step 15

4.4.5 (b) Referential integrity is observed when a data set gets damaged.

96%

101 rated

Answer

False

Step 16

4.4.5 (c) The data is reliable only if it contains references to records in the primary/one table.

98%

120 rated

Answer

False

Step 17

4.4.5 (d) Parallel data sets are used when mining data.

97%

117 rated

Answer

True

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;