0% found this document useful (0 votes)
15 views

1.8.1 Management System (DBMS) (Answers)

Management system notes for computer science students doing a levels

Uploaded by

Port .D. ACE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

1.8.1 Management System (DBMS) (Answers)

Management system notes for computer science students doing a levels

Uploaded by

Port .D. ACE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Computer Science 9608

Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS)
May/June 2016.P11 and May/June 2016.P12

8 (a) (i) Database Management System [1]

(ii) One mark for identifying the way in which the data security is ensured, and one mark for a further
description.

Maximum of two marks per method. Maximum of two methods. [4]

• Issue usernames and passwords...

o stops unauthorised access to the data

o any further expansion e.g. strong passwords / passwords should be changed regularly etc…

• Access rights / privileges...

o so that only relevant staff / certain usernames can read/edit certain parts of the data

o can be read only, or full access / read, write and delete

o any relevant example e.g. only class tutors can edit details of pupils in their tutor group

• Create (regular / scheduled) backups...

o in case of loss/damage to the live data a copy is available

o any relevant example e.g. backing up the attendance registers at the end of each day and storing the data
off-site/to a separate device

• Encryption of data...

o if there is unauthorised access to the data it cannot be understood // needs a decryption key

o any relevant example e.g. personal details of pupils are encrypted before being sent over the Internet to
examination boards

• Definition of different views...

o composed of one or more tables

o controls the scope of the data accessible to authorised users

o any relevant example e.g. teachers can only see their classes

• Usage monitoring / logging of activity...

o creation of an audit /activity log

Page 1 of 10
Computer Science 9608
Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS) o records the use of the data in the database / records operations performed by all users / all access to the
data

o any relevant example, e.g. Track who changed a student’s grade

(iii) Two points from: [2]

• Set up search criteria

• To find / retrieve / return the data that matches the criteria

• Any relevant example e.g. find pupils who were absent on a particular day

(iv) Three points from: [3]

• By storing data in (separate) linked tables data redundancy is reduced / data duplication is controlled...

• Compatibility / data integrity issues are reduced as data only needs to be updated once / is only stored
once.

• Unwanted or accidental deletion of linked data is prevented as the DBMS will flag an error.

• Program - data dependence is overcome.

• Changes made to the structure of the data have little effect on existing programs.

• Ad-hoc / complex queries can be more easily made as the DBMS will have a query language/ QBE form.

• Unproductive maintenance is eliminated as changes only need to be made once (rather than changing
multiple programs).

• Fields can be added or removed without any effect on existing programs (that do not use these fields).

• Security / privacy of the data is improved as each application only has access to the fields it needs.

• There is better control of data integrity as the DBMS (uses its Data Dictionary) to perform validation checks
on data entered.

Examiner’s Report

Question 8

(a)(i) Many candidates were able to correctly expand this commonly used abbreviation.

Page 2 of 10
Computer Science 9608
Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS)
(ii) A small number of candidates gave good answers to this question. There was considerable confusion
between the security of the student data and the integrity of the student data, with candidates writing at
length about verification and validation techniques which was not what was required. The question asked
how the DBMS software could be used to ensure the security of the data, and so answers such as ‘use a
firewall’ did not answer the question.

(iii) Candidates need to improve their understanding of the use of a query processor, which is just one of the
many features of a DBMS. Some candidates gave a good example of use, but only a very few candidates
could describe the generic process of setting up search criteria in order to retrieve data.

(iv) This question asked ‘how the DBMS has replaced software that used a file based approach’. It is not enough
to simply identify the problem with the file-based approach, as the question asked ‘how’. Further detail is
needed describing the way in which the DBMS software overcomes the problem identified. Also, the
question says ‘replaced software that used a file-based approach’. Many candidates overlooked the fact that
the DBMS was replacing a different software package and wrote about the advantages of a DBMS over a
paper-based filing system. This is also an area where the use of the correct terminology is essential. There
was considerable confusion between the use of ‘file’ and ‘record’.

May/June 2016.P13

5 (a) One mark for each correct line. [3]

Page 3 of 10
Computer Science 9608
Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS)
Examiner’s Report

Question 5

(a) This is a clear example of an instance where many candidates had not read the question properly. The
question says, ‘Draw a line to match each feature with its description’. There were three feature boxes in the
question, so candidates should have drawn three lines, one from each box. Most candidates were able to
correctly connect the data dictionary to its description, but there was considerable confusion here between
data security and data integrity.

May/June 2019.P11

2 (b)(i) 1 mark per bullet point to max 3

• Data redundancy // data is repeated in more than one file

• Data dependency // changes to data means changes to programs accessing that data

• Lack of data integrity // entries that should be the same can be different in different places

• Lack of data privacy // all users have access to all data if a single flat file [3]

(b)(ii) 1 mark for each correct name, 1 mark for each matching description, max 2 marks per level

• External

• The individual’s view(s) of the database

• Conceptual

• Describes the data as seen by the applications making use of the DBMS

• Describes the ‘views’ which users of the database might have

• Physical / Internal

• Describes how the data will be stored on the physical media

Page 4 of 10
Computer Science 9608
Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS) • Logical
• Describes how the relationships will be implemented in the logical structure of the database. [4]

Examiner’s Report

Question 2

(b)(i) Many candidates found this question challenging. Some candidates showed a good understanding of the
limitations of a file based approach to storing data. There was some confusion with the storage of files on an
external device, with descriptions of directory structures and file access techniques.

(ii) A minority of candidates answered this question well. Candidates need to improve their understanding of
database schema.

May/June 2019.P12

5 (a)(i) 1 mark for correct answer

Repeated / duplicated data [1]

(a)(ii) 1 mark per bullet point

• Because each record/piece of data is stored once and is referenced by a (primary) key

• Because data is stored in individual tables

• …and the tables are linked by relationships

• By the proper use of Primary and Foreign keys

• By enforcing referential integrity

• By going through the normalisation process [3]

(b)(i) 1 mark per bullet point

• Security ensures that data is safe from unauthorised access // safe from loss

• Integrity ensures that data is accurate / consistent / up to date [2]

Page 5 of 10
Computer Science 9608
Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS) (b)(ii) 1 mark for naming, 1 mark for description
For example:

• Access rights // User accounts

• Restrict actions (e.g. read / read-write) of specific users // unauthorised users cannot access the database

• Views

• Restrict which parts of the database specific users can see

• Password // Biometrics // PIN code

• Prevents unauthorised access

• Automatic Backup

• Create regular copies of data in case of loss

• Encryption

• Data is incomprehensible to unauthorised users [4]

(b)(iii) 1 mark per bullet

• Query Processor

• Developer Interface [2]

Page 6 of 10
Computer Science 9608
Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS)
Examiner’s Report

Question 5

(a)(i) The majority of candidates correctly stated that data redundancy referred to the duplication of data.

(ii) Many responses included a statement about normalisation and there were a small number of excellent
descriptions of the normalisation process. Some candidates need to improve their understanding of
relational databases. There were many answers that mentioned multiple tables but few descriptions of how
the data was stored and linked. This is another question where the precise use of terminology is important.
There was considerable confusion between tables and databases, with the word database frequently being
incorrectly used to refer to a table within the database.

(b)(i) Many candidates correctly explained the difference between security and integrity. A small number of
candidates need to improve their understanding of this topic. It is also not enough, at this level of study, to
simply repeat the wording of the question. It is not enough to say, ‘security is keeping data secure’. There
needs to be some explanation of the meaning of ‘keeping data secure’.

(ii) This question is one that needs to be read carefully. It asks for two security features of a DBMS. There were
some very good answers. Other responses referred to security measures such as firewall and anti-virus
software that are not part of the DBMS.

(iii) The majority of candidates need to improve their understanding of the terms query processor and developer
interface.

May/June 2019.P13

3 (a)(i) 1 mark per bullet point

• Stores all the information about the database // data about the data // metadata about the data

• For example, fields, data types, validation, keys [2]

(a)(ii) 1 mark per bullet point to max 2

• Allows the user to enter criteria

• Searches for data which meets the entered criteria

• Organises the results to be displayed to the user [2]

Page 7 of 10
Computer Science 9608
Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS)
Examiner’s Report

Question 3

(a)(i) Many candidates found this part question challenging and need to improve their understanding of what is
meant by a data dictionary.

(ii) There were a small number of very good answers to this question and most candidates understood that a
query processor would resolve queries. A significant number of candidates were quite vague in their
reference to searching for data and displaying results. Many candidates found describing the purpose of a
query processor to be quite challenging.

Oct/Nov 2019.P12

4 (a)(i) 1 mark per bullet point, max 3 marks from any group to max 4

• Multiple tables are linked together

• ... which eliminates / reduces data redundancy / duplication

• ... and increases data integrity / consistency

• ... which reduces compatibility issues

• ... so data need only be updated once

• ... and associated data will be automatically updated // referential integrity can be enforced

• ... which eliminates unproductive maintenance // which makes it easier to maintain the data

• Program-data independence means that

• ... the structure of data can change and does not affect program

• ... the structure of programs can change and does not affect data

• ... the data can be accessed by any appropriate program

• Allows concurrent access to data

• ... by the use of record locking

Page 8 of 10
Computer Science 9608
Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS) • ... by restricting over-writing changes

• Complex queries can be more easily written

• ... to search / find specific data // specific example related to the sports club

• Different users can be given different access rights

• ... which improves security

• Different users can be given different views of the data

• ... so they do not see confidential information

• ... and data privacy is maintained

• ... accept a valid example related to the sports club [4]

Examiner’s Report

Question 4

(a)(i) Many candidates need to improve their understanding of the features of a relational database. An example
of a good answer is ‘In a relational database, multiple tables are linked together which reduces data
redundancy and improves data integrity. Different users can be given different views of the data, so they do
not see confidential information and data privacy is maintained’.

Page 9 of 10
Computer Science 9608
Topical Past Papers with Answers

1.8.1 Database Management System


(DBMS)
Oct/Nov 2019.P13

3 (b) 1 mark per bullet point to max 2 plus 1 mark for suitable example for each DBMS tool

Developer Interface

• To create user friendly features e.g. forms to enter new bookings

• To create outputs e.g. report of bookings on a given date

• To create interactive features e.g. buttons and menus

Query processor

• To create SQL/QBE queries

• To search for data that meets set criteria, e.g. all bookings for next week

• To perform calculations on extracted data, e.g. number of empty rooms tomorrow [5]

Examiner’s Report

Question 3

(b) Many candidates need to improve their understanding of these DBMS tools. There were more correct
responses for the Query Processor than the Developer Interface. Examples of good answers are ‘A developer
interface allows user-friendly forms and reports to be created. An example of a report might be to show all
the rooms available on a certain date. A query processor allows a user to create queries to select data based
on certain criteria, which might then be displayed on a form. An example of a query might be to list all the
customers with more than one booking on a particular date’.

Page 10 of 10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy