Decorative banner

Option A - Databases

Question 1

SLPaper 2

A school maintains a database of students’ details and teaching resources on a central server. This data can be accessed by all teachers in the school.

Teachers may need to edit resources when preparing their lessons.

When storing student details, data security is an important consideration.

The school has appointed a database administrator (DBA).

A DBA is required to carry out tasks such as ensuring there is a strategy to recover the database if it becomes corrupted and that the data is shared ethically.

1.

Explain how concurrent use of the school database is possible in this situation.

[3]
2.

Describe two ways that data security in the school's database can be maintained.

[4]
3.

Describe one strategy that could be used to ensure the data can be recovered if the database becomes corrupted.

[2]
4.

Suggest how the privacy of student data can be ensured.

[3]

Question 2

SLPaper 2

Consider the following example relation. It holds data about a number of teachers and students from different schools who volunteer to support the local community on particular days.

SCHOOL_VOLUNTEERS_TABLE (School_Name, Code, Address, Date, Num_Volunteers)

The key attributes are underlined.

1.

State what is meant by redundant data in databases.

[1]
2.

Explain one issue that can be caused by redundant data in a database.

[2]
3.

Identify three characteristics of the 1st Normal Form (1NF) which are evident in this relation.

[3]
4.

Explain why a compound key is used for the SCHOOL_VOLUNTEERS_TABLE relation.

[2]
5.

The following shows the normalized SCHOOL_VOLUNTEERS_TABLE relation:

SCHOOLS_TABLE
Code, School_Name, Address

VOLUNTEERS_TABLE
Code, Date, Num_Volunteers

Discuss whether these relations are in third normal form (3NF).

[5]

Question 3

SLPaper 2
1.

Define the term database management system (DBMS).

[1]
2.

Identify three characteristics of logical schema.

[3]
3.

Outline the purpose of a data definition language (DDL).

[2]
4.

Identify two tasks that a database administrator carries out to ensure the security of the database.

[2]

Question 4

SLPaper 2
1.

Define the term database transaction.

[2]
2.

Explain the importance of durability in a database transaction.

[2]
3.

Identify two different types of relationships within databases.

[2]
4.

Describe the nature of the data dictionary.

[4]
5.

Identify four responsibilities of a database administrator.

[4]

Question 5

HLPaper 2

A telecommunication company stores a large amount of data in three databases.

The database segmentation is carried out on the CUSTOMERS database.

Data mining is used to extract knowledge hidden in this large amount of data. Before using data mining processes the existing data should be cleaned up.

Customers committing fraud is a risk to the company.

1.

Evaluate the use of an object-oriented database as opposed to a relational database.

[4]
2.

Define a spatial database.

[2]
3.

State what is meant by database segmentation.

[1]
4.

Explain one benefit of database segmentation to the telecommunication company.

[2]
5.

Explain how ETL processes could be used in data preparation.

[3]
6.

Distinguish between the use of association and sequential patterns as data mining techniques.

[3]
7.

Describe how deviation detection could be used to detect fraud at the telecommunications company.

[2]
8.

Customers who decide to leave the telecommunication company for a competitor may result in huge losses for the telecommunications company.

Explain with the use of an example, how predictive modelling could be used to optimize information sent to existing customers.

[3]

Question 6

SLPaper 2
1.

Outline the difference between an information system and a database.

[3]
2.

A bank maintains a database that stores details of clients and their accounts.

A client wants to transfer money between two accounts held at the same bank.

Explain how the ACID (Atomicity, Consistency, Isolation, Durability) properties would apply in the context of this database transaction.

[8]
3.

A bank holds large volumes of financial and personal information about its clients in its database.

Discuss whether this database should be open to interrogation by the police or the Government.

[6]

Question 7

SLPaper 2

Armour Hardware Company has the following data about salespersons and the quantities of items sold.

Each salesperson can sell many different products.

SALES_PERSON

1.

Outline two reasons why databases are normalized.

[4]
2.

Outline why the SALES_PERSON table is not in 1st Normal Form (1NF).

[2]
3.

Construct the 3rd Normal Form (3NF) of the unnormalized relation shown above.

[8]
4.

Outline why it is necessary to ensure that referential integrity is maintained in databases.

[2]
5.

Outline why a primary key may consist of more than one attribute.

[2]

Question 8

HLPaper 2

The collection, storage and sharing of data is becoming increasingly important for organizations who have a choice about which type of database to use to store their data. Two examples of database types are relational and object-oriented.

The 2016 US presidential election was seen to be a victory for data analytics. Companies that specialize in analytics use data warehouses.

1.

Explain two advantages of using a relational database rather than an object-oriented database.

[4]
2.

State two characteristics of a data warehouse.

[2]
3.

Outline why data needs to be transformed before it can be loaded into the data warehouse.

[2]
4.

Outline why opinion poll data and other election data are timestamped when added to the data warehouse.

[2]
5.

Outline why analytics companies use link analysis.

[2]
6.

Outline why analytics companies use deviation detection.

[2]
7.

Once data has been loaded into a data warehouse it can be mined. The use of data analytics is believed to have been important to the outcome of the US election campaign.

Discuss whether the advantages of data mining techniques in this scenario outweigh the disadvantages.

[6]

Question 9

HLPaper 2

ZCC has a chain of offices that sell different types of paper to customers all over the world. They have data stored in their data warehouses that will help them make important marketing decisions for the future, as they have plans to diversify into other products like gift-wrappers, scribble-pads, stationery, books and calculators.

ZCC is going to use data mining techniques to discover patterns in their data.

The company has customers who have missed the payment deadline for their purchases from ZCC.

1.

Outline why data warehousing is time dependent.

[2]
2.

Outline one reason why ZCC uses a data warehouse.

[2]
3.

Outline why transformation of the data is necessary prior to it being loaded into the data warehouse.

[2]
4.

Compare cluster analysis and classification as techniques for discovering patterns in_ZCC_'s data.

[6]
5.

Describe how the process of deviation detection can be applied to identify customers who are likely to miss the payment deadline for their purchases from ZCC.

[3]
6.

ZCC is aware that other data mining and detection techniques will allow more informed marketing decisions to be made.

Explain how database segmentation and link analysis can be used by ZCC to improve their marketing strategies.

[5]

Question 10

SLPaper 2

One-to-7 is an international organization that works with teachers and other educators. One department within this organization provides an online forum for teachers to discuss ideas for lessons and to share resources.

In order to access this forum teachers are required to submit the following information, which will be stored in a table in the database.

Figure 1: Online form to register personal details to the One-to-7 forum

Once the submit button on the online form has been selected, the personal data is input into the database.

Once the teacher is registered they can post comments on the forum.

The One-to-7 database in managed by the database administrator (DBA).

1.

Identify one reason why the teacher’s name has been split into two fields.

[1]
2.

Outline one reason why there may be concerns about the amount of personal information that is requested.

[2]
3.

Outline why the transaction needs to be atomic in the context of this scenario.

[2]
4.

Explain how transactions are managed to ensure isolation when registered teachers add comments to a discussion thread on the forum.

[3]
5.

Identify two tasks that are carried out by the database administrator (DBA).

[2]
6.

The DBA is considering using the email address as the primary key, but is concerned that many of the 250 000 educators who are registering for this online forum may have more than one email address. Users may create duplicate accounts, deliberately or accidently, by using different email addresses as usernames.

Explain the factors that would need to be considered in using a composite primary key instead of only using the email address.

[4]
Jojo

Intern at RevisionDojo this summer!

Gain work experience and make an impact on thousands of students worldwide. Limited spots available.