4.1 Which ONE of the following is an example of a DBMS?
- Oracle
- MS Excel
- FireFox
- Delphi
4.2 Name TWO aspects of database design that should be addressed to ensure effective functionality - NSC Information Technology - Question 4 - 2017 - Paper 2
Question 4
4.1 Which ONE of the following is an example of a DBMS?
- Oracle
- MS Excel
- FireFox
- Delphi
4.2 Name TWO aspects of database design that should be addressed to ... show full transcript
Worked Solution & Example Answer:4.1 Which ONE of the following is an example of a DBMS?
- Oracle
- MS Excel
- FireFox
- Delphi
4.2 Name TWO aspects of database design that should be addressed to ensure effective functionality - NSC Information Technology - Question 4 - 2017 - Paper 2
Step 1
4.1 Which ONE of the following is an example of a DBMS?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is Oracle.
Step 2
4.2 Name TWO aspects of database design that should be addressed to ensure effective functionality.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data integrity - Ensuring accuracy and consistency of data.
Data security - Protecting data from unauthorized access and breaches.
Step 3
4.3.1 Explain what a record in a database is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A record in a database is defined as a collection of fields that constitutes one row of data in a table. Each record holds specific information pertaining to a single entity, such as a tour in the case of the tblTours table.
Step 4
4.3.2 Identify ONE field where the data type needs to be changed AND suggest a more suitable data type.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The StartDate or EndDate fields, which are currently set to text, need to be changed to the DateTime data type to accurately represent date and time values.
Step 5
4.3.3(a) Explain what an update anomaly is, using the tour guide Kajal Singh as an example.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An update anomaly occurs when changes to data require updates to multiple records. For instance, if the GuideTelNum for Kajal Singh changes, it must be updated in every record where he is listed as the tour guide, leading to risks of inconsistency if any record is missed.
Step 6
4.3.3(b) Explain the basic steps that should be followed when the tblTours table has to be normalized.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Identify functional dependencies and ensure each table has a primary key.
Reduce data redundancy by splitting the table into multiple related tables based on these dependencies.
Establish relationships among the tables to maintain data integrity, like a 1 to many relationship.
Step 7
4.3.4 What is the result after executing this statement?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The statement DELETE FROM tblTours will result in all records from the tblTours table being deleted, but the table structure will remain intact.
Step 8
4.4 Briefly explain how the use of parallel data sets prevents loss of data.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The use of parallel data sets ensures that if one set fails, the other remains accessible and operational, thereby preventing loss of critical data and ensuring continuous data availability.
Step 9
4.5 Explain what data mining is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data mining is the process of analyzing large datasets to uncover patterns, trends, and insights that can inform decision-making and predictive analysis.
Step 10
4.6 Explain how SQL injection can be used as a hacking tool.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SQL injection occurs when an attacker exploits vulnerabilities in an application by inserting malicious SQL statements into queries. This can allow unauthorized access to data or even modification and deletion of database content.
Step 11
4.7.1 Give TWO reasons why distributed databases are used.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Improved performance - Distributing data across multiple sites can enhance access and retrieval speeds.
Fault tolerance - In case of a failure at one node, others can continue to operate, ensuring higher availability.
Step 12
4.7.2 Name the TWO models of distributed databases that are used to ensure that data on various servers remain up to date and synchronized.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Replication - Data is copied across multiple sites, ensuring consistency and reliability.
Partitioning - Data is divided into smaller, manageable pieces distributed across different databases, facilitating scalability and maintenance.