The MMA (Motorist Monitoring Agency) keeps a database on all motorist information and their offences - NSC Information Technology - Question 4 - 2022 - Paper 2
Question 4
The MMA (Motorist Monitoring Agency) keeps a database on all motorist information and their offences.
The following screenshots show the structure of two tables in ... show full transcript
Worked Solution & Example Answer:The MMA (Motorist Monitoring Agency) keeps a database on all motorist information and their offences - NSC Information Technology - Question 4 - 2022 - Paper 2
Step 1
4.1 What does the key symbol to the left of the IDNumber field indicate?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The key symbol indicates that the IDNumber field is the primary key of the table. A primary key uniquely identifies each record in the table, ensuring that no two records can have the same IDNumber.
Step 2
4.2 State TWO distinct requirements of a field designated with the key symbol, as indicated in the example above.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The primary key must be unique, meaning no duplicate values are allowed in the IDNumber field.
It cannot be empty, meaning it is required to have a value (no null values are allowed).
Step 3
4.3 Which field in the tblOffences table would be best suited to establish a one-to-many relationship between the two tables?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The IDNumber field in the tblOffences table is best suited to establish a one-to-many relationship with the tblMotorists table, as multiple offences can be associated with a single motorist.
Step 4
4.4 Provide a more suitable data type for the VehicleRegNumber field AND motivate your answer.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A more suitable data type for the VehicleRegNumber field would be Short Text. This is appropriate because vehicle registration numbers contain both letters and numbers, and a Short Text type is flexible enough to accommodate this format.
Step 5
4.5 Provide a motivation to defend this suggestion.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Splitting the NameAndSurname field into two distinct fields (Name and Surname) allows for better data management, as it provides more flexibility in manipulating or displaying the data. This separation is particularly useful for sorting, categorizing, or searching by first or last name.
Step 6
4.6.1 What is data redundancy?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data redundancy refers to the unnecessary repetition of data within a database. It often leads to inconsistencies and inefficient storage.
Step 7
4.6.2 Name the process during which the design of a database is changed to prevent anomalies from occurring due to problems, like data redundancy.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The process is known as normalization. Normalization organizes the data within the database to minimize redundancy and dependency.
Step 8
4.7.1 Give an example of useful information that can be extracted from the data provided.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of useful information is establishing the frequency of different types of offences, such as identifying the most common offence committed during the observed period.
Step 9
4.7.2 Explain how Step 3 and Step 4 in the data progression diagram may be applied in practice using the information that you identified in the answer to QUESTION 4.7.1.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Step 3 involves processing the data to obtain relevant insights, such as the frequency of offences. Step 4 relates to making informed decisions based on this information, which could include increasing police presence at locations with frequent offences.
Step 10
4.7.3 Explain what fuzzy logic is and give an example, applicable to this context.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Fuzzy logic is a form of reasoning that deals with varying degrees of truth rather than the usual true or false values. An applicable example could be categorizing drivers as 'reckless' based on their offence frequency rather than strict criteria.
Step 11
4.8.1 What is SQL injection?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SQL injection is a hacking technique where malicious SQL statements are entered into input fields instead of data, allowing unauthorized access or manipulation of the database.
Step 12
4.8.2 What is an audit trail?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An audit trail is a record or 'trail' that keeps track of who made changes to a database and when those changes were made. It helps in maintaining accountability and tracking alterations.
Step 13
4.9.1 (a) Identify the type of data integrity that is referred to in the diagram.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of data integrity referred to is logical integrity, which ensures that the data is accurate and consistent in the context of its intended usage.
Step 14
4.9.1 (b) What does physical integrity of data entail?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Physical integrity of data entails ensuring that data is protected against damage from power surges, natural disasters, and hardware failures, safeguarding against loss and corruption.
Step 15
4.9.2 Name TWO ways in which a programmer can ensure that the date of an offence is entered in the correct format.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Use input controls such as date pickers or dropdowns to limit user input to valid dates.
Implement input validation checks that format the date correctly and restrict input to the accepted date format.
Step 16
4.10 Explain how transaction processing is used to maintain data integrity while transactions take place.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Transaction processing ensures data integrity by treating a database transaction as a single unit of work. If any part of the transaction fails, all changes are rolled back, ensuring that the database remains consistent and accurate.