SCENARIO
The import of plants can be dangerous as the plants may be invasive or introduce diseases to native plants and ecosystems - NSC Information Technology - Question 4 - 2020 - Paper 2
Question 4
SCENARIO
The import of plants can be dangerous as the plants may be invasive or introduce diseases to native plants and ecosystems. A rigid testing process must fir... show full transcript
Worked Solution & Example Answer:SCENARIO
The import of plants can be dangerous as the plants may be invasive or introduce diseases to native plants and ecosystems - NSC Information Technology - Question 4 - 2020 - Paper 2
Step 1
4.1.1 State TWO specific requirements relevant to the content of a primary key field.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The data in the field of a primary key must be unique, ensuring there are no duplicates.
The primary key field cannot be null; it must contain a valid entry.
Step 2
4.1.2 (a) Identify a suitable foreign key and give the name of the field and the name of the table that contains the field.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A suitable foreign key is the 'ImporterID' field from the 'tblImporters' table which can be referenced in the 'tblApplications' table.
Step 3
4.1.2 (b) Name the type of relationship between tables tblImporters and tblApplications.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The relationship between 'tblImporters' and 'tblApplications' is a One-to-Many relationship, where one importer can have multiple applications.
Step 4
4.1.3 Name the diagram used to illustrate the relationship between the two tables.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The diagram used to illustrate the relationship between the two tables is known as an Entity Relationship Diagram (ERD).
Step 5
4.2 Suggest a more appropriate data type for the Approved field in the tblApplications table.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A more appropriate data type for the Approved field would be a Boolean type, allowing for true/false values to represent the approval status.
Step 6
4.3 Explain why the ProcessedDuration field in the tblApplications table is redundant.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The ProcessedDuration field is redundant because it can be calculated using the difference between the DateProcessed and DateReceived fields, making manual storage unnecessary.
Step 7
4.4.1 Explain what is meant by the term beta version.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A beta version refers to a pre-release version of software that is made available for testing by a limited number of users, allowing for feedback before the final release.
Step 8
4.4.2 Suggest a way in which the system can be adapted so that the name of a country is captured uniformly in the ImporterCountry field.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The system can be adapted by implementing a standardized list or dropdown menu of country names to prevent inconsistencies in entry.
Step 9
4.5.1 Data validation
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data validation for the Approved field could involve setting validation rules to ensure that only acceptable values (0 or 1) are entered.
Step 10
4.5.2 Data verification
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data verification involves checking the correctness of data entered into the Approved field against the source or the user perspective.
Step 11
4.6 Suggest any TWO physical ways in which access to the database server can be restricted.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Controlled access to the building via NFC or RFID systems.
Implementing server/storage access controls in a locked room or cabinet.
Step 12
4.7.1 Explain the term data independence.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data independence refers to the separation between software that uses the database application and the actual data structure managed by the DBMS server.
Step 13
4.7.2 Give one level of data independence.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Logical independence is one level of data independence that allows changes to the schema at the logical level without altering the external schemas or application programs.
Step 14
4.7.3 Any TWO
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
User/software applications cannot alter the structure or format of the data directly.
Multiple applications can interface with the same data because the physical structure is abstracted from them by the DBMS.