IT3 Database Questions
|
|
|
- Debra Carpenter
- 9 years ago
- Views:
Transcription
1 IT3 Database Questions 1 15 Explain what is meant by a relational database. [2] A (large) collection of data items and links/relationships between them (1) structured in such a way that it allows it to be accessed by a number of different applications programs (1). A group of tables linked together (1) by primary and foreign keys (1). 16 A car hire company uses a relational database management system for organising its rentals. For simplicity, a person may only hire one car at a time. Part of one table in the car hire database could be: CAR [CarID, Make, Model, Colour, Year of registration, Hire rate,...] with CarID being the primary key. Give two other suitable tables you could expect to see in this database, identifying any primary and foreign keys and at least two other fields in each table. [7] CUSTOMER [CustomerID, Title, Firstname, Surname, Address1..] HIRE [HireID, CarID*, CustomerID*, DateOut, ReturnDate] Where underscore = primary key and *=foreign key 1 mark per table name = 2 1 mark per primary key = 2 (one of the marks could be for a composite field in HIRE 1 mark each for two foreign keys = 2 (If 17 Describe how the car hire database structure could be improved to allow a person to hire more than one car at a time. [1] Either: Add a link table/form. Make it a one to many relationship 18 Using appropriate examples, describe the advantages of a relational database approach over a flat file approach. [8] (Security) Hierarchy of passwords limits users to various parts of the program.(1) A receptionist would only have access to basic customer details whilst a manager would see all information on the customer account.(1). (Security) Access rights to parts of the program only certain users can access and change data.(1) A clerk would see all the information on a customer account but be unable to alter the hire rate details whilst a manager could.(1). Consistency - Data consistency is the relationship between the input data, the processed data and the output data as well as other related data.(1) If the system is working properly the data will be correct at each stage and is said to be consistent.(1) Data consistency is using one file to hold a central pool of data. / A company may hold all its customer data in one file. (1) This avoids the need to input data twice so that if data is changed in one file it won t need to be changed in another and remains consistent.(1). Data being inconsistent in a flat file due to possibility of different formats etc (1) and being consistent in a RDBMS as each record is only stored once so cannot have different attributes(1). Redundancy Data redundancy is where you store an item of data more than once / A company may hold its data in different files.(1) This is wasteful because some data may need to be input twice and if data is changed in one it will need to be changed in the other. / Data which is repeated unnecessarily is called redundant data.(1). Independence Data independence the data and the applications/programs used to access it are independent/separate.(1) New applications can be developed to access the data without changing the data / New systems can still use existing data. (1).
2 2 15 A Hospital uses a relational database for storing patient records. Explain what is meant by a relational database. [2] A (large) collection of data items and links between them (1) structured in such a way that it allows it to be accessed by a number of different applications programs (1) A group of tables linked (1) together by primary and foreign keys (1) 16 Data consistency, Data redundancy, Data integrity and Data independence are all terms associated with relational databases. Explain what each of these four terms means. [4] Data consistency is where the same data has exactly the same value and formatting throughout, (normally because it is only stored once) Data consistency is the relationship between the input data, the processed data and the output data as well as other related data. If the system is working properly the data will be correct at each stage and is said to be consistent. Data consistency is using one file to hold a central pool of data this means if information is changed in one file it does not need to be changed in another. Data being inconsistent in a flat file due to possibility of different formats etc and being consistent in a RDBMS as each record is only stored once so cannot have different attributes. Data which is repeated unnecessarily is called redundant data. Data redundancy is where you store an item of data more than once. Data integrity the correctness of the data. Truthful, Accuracy. Data independence the data and the applications/programs used to access it are independent/separate. New applications can be developed to access the data without changing the data. 17 Consultants and patients are allocated to wards but each patient has only one consultant and each ward has their own consultant. One table in this database could be: WARD(Wardid, WardName, NumOfBeds) With Wardid being the primary key. Give two other suitable tables you could expect to see in this database, identifying any primary or foreign key. [6] PATIENT (Patientid, surname, phone, Wardid#, Consultantid#) CONSULTANT (Consultantid, surname, phone, etc) Underline = primary, # = foreign 1 mark per table name 1 mark per foreign key 1 mark per primary key 18 Describe what a data warehouse is and give an example of how a company might use it. [3] Large, Archive and used for Decision Making Look for 2 of these 3 Up to two marks for an example of use Examples for one mark (What or Why) Allows the company to store information about every sale. (1) Allows the company to see who has bought what items and when. (1) Can use it to plan future changes or developments in their business. (1) Allows the company to use data mining. (1) Allows the company to find the most popular product (1)
3 19 Explain what is meant by data mining and give a detailed example of how a company might use it. [3] One mark for the meaning (patterns / trends / generating new information) Data mining is interrogating the data to find patterns in the data which is stored in the warehouse. Examples worth 1 mark: Can provide: then use to target with a mail shot. value can be processed into a report to help decision making.
4 3 15 Explain what is meant by a relational database. [2] A (large) collection of data items and links/relationships between them (1) structured in such a way that it allows it to be accessed by a number of different applications programs (1) A group of tables linked together (1) by primary and foreign keys (1). 16 A DVD Rental Company uses a relational database management system for organising its lending. For simplicity, a person may only borrow one DVD at a time. Part of one table in the DVD Rental Company database could be: BROWER [BorrowerID, FirstName, Surname, Borrower Type, Address1,...] with BorrowerID being the primary key. Give two other suitable tables you could expect to see in this database, identifying any primary and foreign keys. [7] DVD [DVDID, Title, Genre, Classification,..] LOAN [LoanID, DVDID*, BorrowerID*, DateOut, ReturnDate] Where underscore = primary key and *=foreign key 1 mark per table name = 2 1 mark per primary key = 2 1 mark for two foreign keys = 1 (If key duplicated - no mark) 1 mark per table for 2 extra fields = 2 17 Relational databases are normalised to work effectively. Explain what is meant by the term data normalisation. [2] A staged (mathematical) process (1) which removes repeated groups of data and inconsistencies. (1) Simplifying data structures (1) so that attributes in each table only relate to the entity. (1) Marks can be gained by using an example of the process of going from first to third form. Do NOT accept advantages of databases 18 Some companies now use distributed databases. Explain what is meant by the term distributed databases and explain their advantages and disadvantages. [6] A distributed database is a single database that is under the control of a DBMS where the storage devices are not all attached to a common processor (1). Instead the data is stored in storage devices attached to multiple computers usually located across a network (1). A distributed database has data stored on a number of computers at different locations (1) but appears as one logical database (1). Advantages database user queries of the database -dependence on one central huge store of data server. Disadvantages using the data on the local backup then this data might be lost to others have adequate
5 data inconsistency y issues particularly if sensitive personal data is being transferred
6 4 13 Relational databases are normalised to work effectively. Explain what is meant by the term data normalisation. [2] A staged (mathematical) process (1) which removes repeated groups of data and inconsistencies. (1) Simplifying data structures (1) so that attributes in each table only relate to the entity. (1) Normalisation is the organisation 14 Give three reasons why relational databases are more secure than a flat file approach. [3] Hierarchy of passwords -- passwords to see separate parts NOT just passwords Storage of data separate to programs Access rights to parts of the program. 15 Distributed databases are widely used. Explain what is meant by the term distributed databases and explain their advantages and disadvantages. [7] A distributed database is a single database that is under the control of a DBMS where the storage devices are not all attached to a common processor (1). Instead the data is stored in storage devices attached to multiple computers usually located across a network (1). A distributed database has data stored on a number of computers at different locations (1) but appears as one logical database (1). 1 mark each for any four points but must have at least one advantage and one disadvantage Advantages ral site it could be reduplicated from local site. database. e database. -dependence on one central huge store of data. server. Disadvantages on the local backup then this data might be lost to others. data inconsistency. articularly if sensitive personal data is being transferred. 16 Explain what is meant by a data warehouse and describe the advantages it might give a retail company. [3] Large, Archive and used for Decision Making Look for 2 of these 3 A large collection of archived data used for decision making (1) A large company generates huge quantities of data stored in a consistent order to make interrogation more productive.(1)
7 Data is non-volatile and time invariant (archive data).used to support organisational decision making.(1) A huge database specifically structured for information access and reporting (1) Up to two marks for an example of use Examples for one mark (What or Why) Allows the company to store information about every sale. (1) Allows the company to see who has bought what items and when. (1) Can use it to plan future changes or developments in their business. (1) Allows the company to use data mining. (1) Allows the company to find the most popular product. (1) Example for two marks (What and Why) Allows the company to see who has bought what items (1) and then target them with special offers. (1) (why) 17 Explain what is meant by data mining and describe an example of how a retail company might use it. [3] Data mining is interrogating the data to find patterns in the data which is stored in the warehouse. Examples worth 1 mark: Can provide: ely to buy a certain product, which they can then use to target with a mail shot. atterns.
8 5 17 Data in a relational database is normalised. Explain what is meant by a relational database and data normalisation. [4] A large collection of data items and links between them (1) (structured in such a way that) it allows it to be accessed by a number of different applications programs (1) / a group of tables linked (1) together by primary and foreign keys (1). Suitable definition of data normalisation, such as: A staged (mathematical) process (1) which removes repeated groups of data and inconsistencies. (1) Simplifying data structures (1) so that attributes in each table only relate to the entity. (1) Normalisation is the organisation of data into tables (1) which relate to a single entity. (1) 18 Describe the terms data redundancy, data integrity and data consistency in relation to a relational database approach over a flat-file approach. [3 2] Data redundancy is where you store an item of data more than once. A company may hold its data in different files. This is wasteful because some data may need to be input twice. Data which is repeated unnecessarily is called redundant data. It refers to the unnecessary duplication of data. In a flat-file database details about such information as customer details will be duplicated. In a well designed relational database there should be no repeating attributes', no piece of data should be unnecessarily repeated. Data integrity The integrity of data is the correctness, i.e. the extent to which it truthfully represents the original information. Truthful, Accuracy. One of the problems of maintaining integrity arises when updating occurs, and every record has to be changed in a flat-file database, if one record was left unchanged the data would no longer be wholly correct. In a relational database you only have to change data in one table and all other references in any other application will automatically be changed. Data consistency Data consistency is the relationship between the input data, the processed data and the output data as well as other related data. If the system is working properly the data will be correct at each stage and is said to be consistent. Data consistency is using one file to hold a central pool of data. A company may hold all its customer data in one file. This avoids the need to input data twice so that if data is changed in one file it won t need to be changed in another and remains consistent. Data being inconsistent in a flat file due to possibility of different formats, etc, and being consistent in a RDBMS as each record is only stored once so cannot have different attributes. A date field could be stored in file as a text field but in another field as a date/time field and the data would be incompatible. In a relational database because the attributes of any one entity are contained within one file, there is no risk of the same attribute being stored in a different format in a different file (Spelling mistakes in names). 19 Give two reasons why relational databases are more secure than the flat-file approach. [2] Any two from: Hierarchy of passwords - passwords to see separate parts NOT just passwords Storage of data separate to programs
9 Access rights to parts of the program. 20 Modern technology also makes use of distributed databases. Define what is meant by a distributed database. Describe two security issues that apply to distributed databases and suggest a different method for overcoming each issue. [5] A distributed database is a single database that is under the control of a DBMS where the storage devices are not all attached to a common processor. Instead the data is stored in storage devices attached to multiple computers usually located across a network. A distributed database has data stored on a number of computers at different locations but appears as one logical database. Computers are located on a number of sites so it is important to ensure only authorised users can access the system. Can be achieved by using passwords to authorised users, and regularly updating the passwords to increase the levels of security. Data regularly transmitted between different sites and so data may become corrupt or be tampered with during transmission. Checks are put in place in order to ensure that the data that arrives is both secure and accurate. Encryption of transmitted data. Viruses if linked to a local database Use a firewall and anti-virus software Problem hacking into local data Hacking into transmitted data are separate problems
10 6 17 Many companies would now struggle to operate effectively without database technology. Explain what is meant by a relational database. [2] A relational database is a large collection of data items/tables and links between them (1 mark) Plus either of the following for second mark structured in such a way that allows it to be accessed by a number of different applications programs use of primary and foreign keys. 18 Using appropriate examples, describe the advantages of a relational database approach over a flat file approach. [6] Hierarchy of passwords limits users to various parts of the program. A receptionist would only have access to basic patient details whilst a doctor would see all information on the patient. Access rights to parts of the program only certain users can access and change data. A nurse would see all the information on a patient but be unable to alter the drug dose details whilst a doctor could. Consistency - Data consistency is the relationship between the input data, the processed data and the output data as well as other related data. If the system is working properly the data will be correct at each stage and is said to be consistent. Data consistency is using one file to hold a central pool of data. A company may hold all its customer data in one file. This avoids the need to input data twice so that if data is changed in one file it won t need to be changed in another and remains consistent. Data being inconsistent in a flat file due to possibility of different formats etc and being consistent in a RDBMS as each record is only stored once so cannot have different attributes Redundancy Data redundancy is where you store an item of data more than once / A company may hold its data in different files. This is wasteful because some data may need to be input twice and if data is changed in one it will need to be changed in the other. / Data which is repeated unnecessarily is called redundant data. Independence Data independence the data and the applications/programs used to access it are independent/separate. / New applications can be developed to access the data without changing the data./ New systems can still use existing data. 19 Describe what a data warehouse is and give an example of how a company might use it. [3] Large, Archive and used for Decision Making Look for 2 of these 3 A large company generates huge quantities of data stored in a consistent order to make interrogation more productive.(1) Data is non-volatile and time invariant (archive data).used to support organisational decision making.(1) Up to two marks for an example of use Examples for one mark Allows the company to store information about every sale. (1) Allows the company to see who has bought what items and when. (1) Can use it to plan future changes or developments in their business. (1) Allows the company to use data mining. (1) Allows the company to find the most popular product and buy more (1) Example for two marks Allows the company to see who has bought what items (and why) and then target them
11 with special offers 20 Explain what is meant by data mining and give a detailed example of how a company might use it. [3] Data mining is interrogating the data to find patterns in the data which is stored in the warehouse. Up to two marks for example of use Look for the idea of trends, patterns or generating new information is the analysis of a large amount of data in a data warehouse to provide new information. Is interrogating large amounts of data is a speculative process investigating potential patterns involves the presumption that dormant within the data are undiscovered patterns / groupings / sequences / associations. software uses complex algorithms to search for patterns. is drilling down into the mass of data so users can understand it more / discover meaningful patterns. Is looking for meaningful patterns in a large mass of data and presenting results in tables and graphs. Examples worth 1 mark: Can provide: the company with a list of customers likely to buy a certain product, which they can then use to target with a mail shot. comparisons with competitors useful what if results from modelling exercises predictions for future sales analysis of best sites for shops analysis of sales patterns returned information can be tested for plausibility. data if of value can be processed into a report to help decision making. 21 Discuss in general terms, the advantages and disadvantages distributed databases give to a company. [3] Must be in context of a company Advantages If data lost on central site it could be reduplicated from local site Allows sharing of the data and the results of processing the data New locations can be added to the database without the need for rewriting the entire database Faster response to user queries of the database Non-dependence on one central huge store of data Easy to backup and copy data from one server to another If one server fails then the other servers can be used Reduces network traffic as local queries can be performed using the data on the local server. Disadvantages Software more complex than a centralised database system If data is transferred it presents more of a security risk from hackers As all the data is not stored in one location if a local site does not have adequate backup then this data might be lost to others. If data is stored and updated in more than one place there is an increased chance of data inconsistency. Heavy reliance on networks and communications which may not always be reliable
12 Security issues particularly if sensitive personal data is being transferred If one of the links to a server failed then the data could not be obtained from that server Increased costs owing to the use of expensive communication lines.
Explain the role of the database administrator.
CG3.6 Databases and Distributed Systems You need to understand: Databases and distributed systems Explain what is meant by data consistency, data redundancy and data independence. Describe the relative
Topics. Database Essential Concepts. What s s a Good Database System? Using Database Software. Using Database Software. Types of Database Programs
Topics Software V:. Database concepts: records, fields, data types. Relational and objectoriented databases. Computer maintenance and operation: storage health and utilities; back-up strategies; keeping
ETPL Extract, Transform, Predict and Load
ETPL Extract, Transform, Predict and Load An Oracle White Paper March 2006 ETPL Extract, Transform, Predict and Load. Executive summary... 2 Why Extract, transform, predict and load?... 4 Basic requirements
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:
Chapter 7 Information System Security and Control
Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect
DATABASE SECURITY, INTEGRITY AND RECOVERY
DATABASE SECURITY, INTEGRITY AND RECOVERY DATABASE SECURITY, INTEGRITY AND RECOVERY Database Security and Integrity Definitions Threats to security and integrity Resolution of problems DEFINITIONS SECURITY:
3 SYSTEM DEVELOPMENT METHODOLOGIES
3 SYSTEM DEVELOPMENT METHODOLOGIES 3.1 INTRODUCTION Different types of system development methodologies are used in designing information system. Depending upon the actual requirement of the system, different
Unit 5.1 The Database Concept
Unit 5.1 The Database Concept Candidates should be able to: What is a Database? A database is a persistent, organised store of related data. Persistent Data and structures are maintained when data handling
Key Requirements for a Job Scheduling and Workload Automation Solution
Key Requirements for a Job Scheduling and Workload Automation Solution Traditional batch job scheduling isn t enough. Short Guide Overcoming Today s Job Scheduling Challenges While traditional batch job
Cloud Storage vs Physical Media What you need to know!
Cloud Storage vs Physical Media What you need to know! What You Need to Know about Cloud and Physical Storage 3 Cloud Storage: 4 What is the cloud? 4 Cloud Storage Pros 5 Cloud Storage Cons 6 Physical
Domain Analytics. Jay Daley,.nz Registrar Conference, 2015
Domain Analytics Jay Daley,.nz Registrar Conference, 2015 Domain Analytics Explained Using data science to provide insight into domain name usage Value for registrars understanding customers Value for
www.xtremepapers.net
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education *83455669* INFORMATION AND COMMUNICATION TECHNOLOGY 047/0 Paper May/June 2009 2 hours Candidates
Europcar.biz Normal User Guide
Europcar Group UK Limited Europcar.biz Normal User Guide Contents Landing Page Europcar.biz Main Log-in Page - 2 Homepage Europcar.biz Home Page 3 Reservation Placing a Reservation 4 New Reservations 5
MULTIPLE CHOICE FREE RESPONSE QUESTIONS
MULTIPLE CHOICE FREE RESPONSE QUESTIONS World ORT Union W o r d p r o c e s s o r s What is a Word Processor used for? A. To analyse figures B. Creating and editing C. Storing information What hardware
Databases What the Specification Says
Databases What the Specification Says Describe flat files and relational databases, explaining the differences between them; Design a simple relational database to the third normal form (3NF), using entityrelationship
Collated Food Requirements. Received orders. Resolved orders. 4 Check for discrepancies * Unmatched orders
Introduction to Data Flow Diagrams What are Data Flow Diagrams? Data Flow Diagrams (DFDs) model that perspective of the system that is most readily understood by users the flow of information around the
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE Learning objective: explain the use of computer assisted audit techniques in the context of an audit discuss and provide relevant examples of the use of test
Foundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of
Business-to-Consumer (B2C) parts and accessories website
Business-to-Consumer (B2C) parts and accessories website Driving Business Performance Contents 4 Introduction 5 Introduction to the different levels 5 Static Website 5 Basic - Level 1 5 Standard - Level
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment
Microsoft Outlook 2007 Introductory guide for staff
Platform: Windows PC Ref no: USER180 Date: 8 th January 2008 Version: 1 Authors: Julie Adams, Claire Napier Microsoft Outlook 2007 Introductory guide for staff This document provides an introduction to
IT and CRM A basic CRM model Data source & gathering system Database system Data warehouse Information delivery system Information users
1 IT and CRM A basic CRM model Data source & gathering Database Data warehouse Information delivery Information users 2 IT and CRM Markets have always recognized the importance of gathering detailed data
Evaluation Guide. Sales Quota Allocation Performance Blueprint
Evaluation Guide Sales Quota Allocation Performance Blueprint Introduction Pharmaceutical companies are widely recognized for having outstanding sales forces. Many pharmaceuticals have hundreds of sales
4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.
Topic 8 Database Security LEARNING OUTCOMES When you have completed this Topic you should be able to: 1. Discuss the important of database security to an organisation. 2. Identify the types of threat that
Data storage, collaboration, backup, transfer and encryption
Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and
Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches
Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines
015 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B C 3 B 4 A 5 B 6 D 7 D 8 A 9 A 10 C 11 D 1 A 13 C 14 B 15 B
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT SYSTEMS ANALYSIS & DESIGN EXAMINERS REPORT
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT SYSTEMS ANALYSIS & DESIGN EXAMINERS REPORT Monday 28 th September 2015 Case Study for both sections A and
Checklists for Going into Business
Checklists for Going into Business Modified by NCF: October 2003 Checklists for Going into Business Summary Thinking of owning and managing your own business? It s a good idea provided you know what it
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
East & South East England Specialist Pharmacy Services Medicines Use and Safety Division Community Health Services Transcribing
East & outh East England pecialist Pharmacy ervices East of England, London, outh Central & outh East Coast Medicines Use and afety Division Community Health ervices Transcribing Guidance to support the
Answer: Can be used on smart phones/ipad/tablets OR can be used anywhere that has an internet connection. Do not mention anything to do with cost
Give the main use of VOIP Technology Answer: Speaking/Talking/Video over the internet Identify one benefit of using VOIP Technology Answer: Can be used on smart phones/ipad/tablets OR can be used anywhere
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT DATABASE SYSTEMS
A1 BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT DATABASE SYSTEMS Friday 4 th April 2014 - Morning Answer any FOUR questions out of SIX. All questions
Alexander Nikov. 5. Database Systems and Managing Data Resources. Learning Objectives. RR Donnelley Tries to Master Its Data
INFO 1500 Introduction to IT Fundamentals 5. Database Systems and Managing Data Resources Learning Objectives 1. Describe how the problems of managing data resources in a traditional file environment are
Creating Tables ACCESS. Normalisation Techniques
Creating Tables ACCESS Normalisation Techniques Microsoft ACCESS Creating a Table INTRODUCTION A database is a collection of data or information. Access for Windows allow files to be created, each file
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
2010 Software Development GA 3: Written examination
2010 Software Development GA 3: Written examination GENERAL COMMENTS The 2010 Information Technology: Software Development paper comprised three sections: Section A contained 20 multiple-choice questions
Technology, Production, and Costs
Chapter 10 Technology, Production, and Costs 10.1 Technology: An Economic Definition 10.1 LEARNING OBJECTIVE Learning Objective 1 Define technology and give examples of technological change. A firm s technology
DATABASE MANAGEMENT SYSTEMS
CHAPTER DATABASE MANAGEMENT SYSTEMS This chapter reintroduces the term database in a more technical sense than it has been used up to now. Data is one of the most valuable assets held by most organizations.
What is a Credit Score and Why Do I Care What It Is?
What is a Credit Score and Why Do I Care What It Is? Your Credit Score is a lot like the score you get on a test. You get points for good credit decisions and behavior and you get points taken away for
from Larson Text By Susan Miertschin
Decision Tree Data Mining Example from Larson Text By Susan Miertschin 1 Problem The Maximum Miniatures Marketing Department wants to do a targeted mailing gpromoting the Mythic World line of figurines.
Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.
Copyright 2015 Pearson Education, Inc. Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright 2015 Pearson Education, Inc. Technology in Action Chapter 9 Behind the
Kevin Hayler. Where I m from
THE PROPOSITION Where I m from I ve worked in the Credit Card industry for over 17 years, starting in 1995 with Barclaycard as a Sales Manager, progressing through the ranks before moving to Bank of Scotland
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
Foundations of Business Intelligence: Databases and Information Management
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 6.1 2010 by Prentice Hall LEARNING OBJECTIVES Describe how the problems of managing data resources in a traditional
PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;
PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal
HelpDesk Product sheet
Product sheet Artologik is the tool for those who are looking for an easy to use but powerful program for support and ticket handling. With Artologik, it is easy to handle entered into the database, anyone
Files. Files. Files. Files. Files. File Organisation. What s it all about? What s in a file?
Files What s it all about? Information being stored about anything important to the business/individual keeping the files. The simple concepts used in the operation of manual files are often a good guide
TIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz March 1, 2015 The Database Approach to Data Management Database: Collection of related files containing records on people, places, or things.
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras Lecture - 41 Value of Information In this lecture, we look at the Value
Competitive Organisational Structures
Competitive Organisational Structures Organisational structure basics Introduction The way in which a business is organised has a direct effect on its competitiveness. For a business to be able to achieve
Introduction to Computing. Lectured by: Dr. Pham Tran Vu [email protected]
Introduction to Computing Lectured by: Dr. Pham Tran Vu [email protected] Databases The Hierarchy of Data Keys and Attributes The Traditional Approach To Data Management Database A collection of
2012 Software Development GA 3: Written examination
2012 Software Development GA 3: Written examination GENERAL COMMENTS The 2012 Information Technology: Software Development paper comprised three sections: Section A contained 20 multiple-choice questions
Executive Summary. Page 2 of 8
Corporate Overview Technology, care and skill will not get you anywhere, unless it is delivered with disciplined commitment to achieve success. We are committed to help you achieve this success and we
Scottish Families Affected by Alcohol and Drugs
Scottish Families Affected by Alcohol and Drugs Scottish Families Affected by Alcohol and Drugs is Scotland s authoritative voice on supporting families affected by the problem substance use of a loved
A target cost is arrived at by identifying the market price of a product and then subtracting a desired profit margin from it.
Answers Fundamentals Level Skills Module, Paper F5 Performance Management June 2015 Answers Section A 1 C Divisional profit before depreciation = $2 7m x 15% = $405,000 per annum. Less depreciation = $2
Basics of Dimensional Modeling
Basics of Dimensional Modeling Data warehouse and OLAP tools are based on a dimensional data model. A dimensional model is based on dimensions, facts, cubes, and schemas such as star and snowflake. Dimensional
Product Development: - Loan pricing
Product Development: - Loan pricing October 2008 Peter Njuguna Deputy Program Director WOCCU SACCO Cap Project Nairobi, Kenya Course objectives Identify the two ways a SACCO can charge for loans. Recognize
Guide to cash flow management
Guide to cash flow management Cash flow management What is cash flow management? For a business to be successful, good cash flow management is crucial. Cash flow is the primary indicator of a business
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
Aim To help students prepare for the Academic Reading component of the IELTS exam.
IELTS Reading Test 1 Teacher s notes Written by Sam McCarter Aim To help students prepare for the Academic Reading component of the IELTS exam. Objectives To help students to: Practise doing an academic
SALES & SALES MANAGEMENT TRAINING
SALES & SALES MANAGEMENT TRAINING Sales are the key to setting up and running a successful business. However, it is not sufficient just to have a passion for your particular product or service. You will
Qualification Specification
BCS Level 2 Certificate in IT User Skills (ECDL Core) Version 1.0 December 2015. Contents 1. About BCS 3 2. Equal Opportunities 3 3. Introduction to the qualification 4 3.1 Qualification summary 4 3.2
Database Design Basics
Database Design Basics Table of Contents SOME DATABASE TERMS TO KNOW... 1 WHAT IS GOOD DATABASE DESIGN?... 2 THE DESIGN PROCESS... 2 DETERMINING THE PURPOSE OF YOUR DATABASE... 3 FINDING AND ORGANIZING
Data Modelling And Normalisation
Access made easy. Data Modelling And Normalisation 02 www.accessallinone.com This guide was prepared for AccessAllInOne.com by: Robert Austin This is one of a series of guides pertaining to the use of
ER modelling, Weak Entities, Class Hierarchies, Aggregation
CS344 Database Management Systems ER modelling, Weak Entities, Class Hierarchies, Aggregation Aug 2 nd - Lecture Notes (Summary) Submitted by - N. Vishnu Teja Saurabh Saxena 09010125 09010145 (Most the
WHAT INFORMATION IS COLLECTED AT MOTOROLA.COM.VN AND/OR MOTOROLA.VN AND HOW IS IT PROCESSED AND USED?
MOTOROLA PRIVACY POLICY This Privacy Statement ( Policy ) is subject to change at Motorola s discretion. If we decide to change this Policy, we will post the amended Policy on this website so you will
Clinical Database Information System for Gbagada General Hospital
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 9, September 2015, PP 29-37 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org
CHAPTER 3 - CUSTOMER RELATIONSHIP MANAGEMENT (CRM)
CHAPTER 3 - CUSTOMER RELATIONSHIP MANAGEMENT (CRM) 3.1 INTRODUCTION The most important purpose of any service orientated organisation is to retain customers. It is critical for any organization to keep
Chapter 6. Foundations of Business Intelligence: Databases and Information Management
Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:
In this chapter you will find information on the following subjects:
17 1. From XP to Vista Microsoft, the creator of Windows, has published various versions of the Windows operating system over the past two decades. Windows Vista is the latest version, the successor to
Foundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Content Problems of managing data resources in a traditional file environment Capabilities and value of a database management
NETAPP WHITE PAPER Looking Beyond the Hype: Evaluating Data Deduplication Solutions
NETAPP WHITE PAPER Looking Beyond the Hype: Evaluating Data Deduplication Solutions Larry Freeman, Network Appliance, Inc. September 2007 WP-7028-0907 Table of Contents The Deduplication Hype 3 What Is
The Mathematics 11 Competency Test Percent Increase or Decrease
The Mathematics 11 Competency Test Percent Increase or Decrease The language of percent is frequently used to indicate the relative degree to which some quantity changes. So, we often speak of percent
Step by step guide to using Audacity
Step by step guide to using Audacity Contents 1 - Introduction... 1 2 - Getting Started... 2 2.1 - Starting Audacity... 2 3 Recording, Saving and Editing Your Audio... 3 3.1 Recording your audio... 3 3.2
What is Data Virtualization? Rick F. van der Lans, R20/Consultancy
What is Data Virtualization? by Rick F. van der Lans, R20/Consultancy August 2011 Introduction Data virtualization is receiving more and more attention in the IT industry, especially from those interested
DATABASE MANAGEMENT SYSTEMS. Question Bank:
DATABASE MANAGEMENT SYSTEMS Question Bank: UNIT 1 1. Define Database? 2. What is a DBMS? 3. What is the need for database systems? 4. Define tupule? 5. What are the responsibilities of DBA? 6. Define schema?
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
Glossary of Telco Terms
Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business
A Guide to VAT. 02392 883337 [email protected] www.boox.co.uk
A Guide to VAT In this guide, we walk you through the different VAT schemes and explain how to comply with the relevant laws. 02392 883337 [email protected] www.boox.co.uk When you go self-employed, one
DATABASE INTRODUCTION
Introduction The history of database system research is one of exceptional productivity and startling economic impact. We have learnt that from the days of file-based systems there are better ways to handle
The Art of Designing HOLAP Databases Mark Moorman, SAS Institute Inc., Cary NC
Paper 139 The Art of Designing HOLAP Databases Mark Moorman, SAS Institute Inc., Cary NC ABSTRACT While OLAP applications offer users fast access to information across business dimensions, it can also
