4.1 A loyalty program at stores is a way in which invisible data capturing can take place - NSC Information Technology - Question 4 - 2022 - Paper 2
Question 4
4.1 A loyalty program at stores is a way in which invisible data capturing can take place.
4.1.1 Give another example of invisible data captured about a customer du... show full transcript
Worked Solution & Example Answer:4.1 A loyalty program at stores is a way in which invisible data capturing can take place - NSC Information Technology - Question 4 - 2022 - Paper 2
Step 1
Give another example of invisible data captured about a customer during purchases, other than their personal details such as name, surname and address.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of invisible data captured about a customer could be their purchasing habits, such as preferred shopping hours or the types of products they frequently buy.
Step 2
Give ONE reason why a company would want to capture invisible data on the purchases made by cardholders.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A company may want to capture invisible data to predict and plan for inventory needs, ensuring they stock products that align with customer preferences.
Step 3
Except for card readers and credit cards, name TWO other mechanisms of invisible data capturing.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two other mechanisms for invisible data capturing include online activities (such as web searches and online purchases) and GPS navigation data from location-based services.
Step 4
State TWO ways of ensuring the validity of captured data.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two ways to ensure the validity of captured data are: 1) Format check, which verifies if data is in the correct format, and 2) Uniqueness check, which ensures that no duplicate records exist for certain fields.
Step 5
How can two customers with the same name and surname be distinguished in the database?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two customers with the same name and surname can be distinguished by assigning each customer a unique identifier, such as a ClientID, which serves as the primary key in the database.
Step 6
What is the term given to the unnecessary repetition of data across multiple records?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term for unnecessary repetition of data across multiple records is 'data redundancy.'
Step 7
An update anomaly can occur when data is repeated unnecessarily. Explain how an update anomaly takes place.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An update anomaly occurs when a change needs to be made to a data field, but that field exists in multiple locations. Consequently, if one instance is updated and others are not, it leads to inconsistent data across the database.
Step 8
Identify the type of relationship presented in the diagram: Worker ↔ has ↔ Job.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of relationship illustrated is a 'One-to-Many' relationship, where one Worker can have multiple Jobs.
Step 9
Identify the type of relationship presented in the diagram: Company ↔ has ↔ Customers.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of relationship illustrated here is a 'One-to-Many' relationship, where one Company can have multiple Customers.
Step 10
Name the type of key formed when multiple fields are used together as the primary key.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of key formed when multiple fields are used together as the primary key is called a 'Composite Key' or 'Compound Key.'
Step 11
Suggest another key field that can be created in tblCollections instead of using the three fields as the primary key.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Another key field that could be created in tblCollections is 'CollectionNumber,' which would serve as a unique identifier for each collection record.
Step 12
What will the data type of the primary key field in table tblClients be?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The data type of the primary key field in table tblClients will be 'Short Text,' as it typically requires a unique string identifier for each client.
Step 13
Explain the term referential integrity.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Referential integrity ensures that relationships between tables remain consistent. It means that a foreign key in one table must correspond to a valid primary key in another table, preventing orphan records.
Step 14
Indicate whether the following statements related to parallel data sets are TRUE or FALSE.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!