The Internet café must keep records of the users and be able to charge users for the time that they were logged onto the Internet - NSC Information Technology - Question 4 - 2016 - Paper 2
Question 4
The Internet café must keep records of the users and be able to charge users for the time that they were logged onto the Internet. A database for this purpose has be... show full transcript
Worked Solution & Example Answer:The Internet café must keep records of the users and be able to charge users for the time that they were logged onto the Internet - NSC Information Technology - Question 4 - 2016 - Paper 2
Step 1
Motivate the choice of radio buttons for the Gender option.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The use of radio buttons for the Gender option is appropriate because:
Only one option can be selected at a time, ensuring clarity in user choice.
It limits the selection to valid responses, which improves data integrity.
Step 2
Without changing the label, suggest ONE way in which the GUI could be changed to indicate the format in which the user should enter the time.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One way to indicate the format for entering time in the GUI could be to provide two combo boxes: one for hours and one for minutes. This allows users to select valid time entries without error.
Step 3
Explain the difference between valid data and correct data by using the information in the GUI above.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Valid data refers to data that adheres to the specified formats or criteria (e.g., the time must be within a 0-24 hour range). Correct data, on the other hand, refers to data that accurately reflects the real-world scenario intended (e.g., entering 15:00 for a user logging in at 3 PM rather than entering an incorrect format like 25:00).
Step 4
Indicate how the tables above could be linked so that a one-to-many relationship can be formed.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The tables tblComputers and tblUsers can be linked by establishing a foreign key relationship. The primary key of tblComputers (ComputerNumber) would be referenced in tblUsers, allowing each computer to be associated with multiple user records, thus forming a one-to-many relationship.
Step 5
Display the logout time of the users who paid with debit cards in sequential order.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SELECT LogoutTime
FROM tblUsers
WHERE PaymentMethod = 'Debit Card'
ORDER BY LogoutTime ASC;
Step 6
Change the payment method for 73110117564076 to 'Credit Card'.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
UPDATE tblUsers
SET PaymentMethod = 'Credit Card'
WHERE UserIDNo = '73110117564076';
Step 7
Display the number of users who paid with cash. The number of users must be displayed in a field called CountCashIds.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SELECT COUNT(UserIDNo) AS CountCashIds
FROM tblUsers
WHERE PaymentMethod = 'Cash';
Step 8
Display a list of users who logged in after 12:00 on 2016/02/25.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SELECT *
FROM tblUsers
WHERE (LoginTime > '12:00')
AND (LoginDate = '2016/02/25');
Step 9
State the basic information that is captured during an audit trail.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An audit trail captures information about who made changes to the database and when those changes were made. This helps to maintain data integrity and transparency.
Step 10
Indicate TWO ways in which data is captured invisibly.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Monitoring user activities on websites without their explicit consent.
Collecting data through cookies or tracking pixels when users browse the Internet.
Step 11
What is this process called?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!