1.8.1 Management System (DBMS) (Answers)
1.8.1 Management System (DBMS) (Answers)
(ii) One mark for identifying the way in which the data security is ensured, and one mark for a further
description.
o any further expansion e.g. strong passwords / passwords should be changed regularly etc…
o so that only relevant staff / certain usernames can read/edit certain parts of the data
o any relevant example e.g. only class tutors can edit details of pupils in their tutor group
o any relevant example e.g. backing up the attendance registers at the end of each day and storing the data
off-site/to a separate device
• Encryption of data...
o if there is unauthorised access to the data it cannot be understood // needs a decryption key
o any relevant example e.g. personal details of pupils are encrypted before being sent over the Internet to
examination boards
o any relevant example e.g. teachers can only see their classes
Page 1 of 10
Computer Science 9608
Topical Past Papers with Answers
• Any relevant example e.g. find pupils who were absent on a particular day
• By storing data in (separate) linked tables data redundancy is reduced / data duplication is controlled...
• Compatibility / data integrity issues are reduced as data only needs to be updated once / is only stored
once.
• Unwanted or accidental deletion of linked data is prevented as the DBMS will flag an error.
• Changes made to the structure of the data have little effect on existing programs.
• Ad-hoc / complex queries can be more easily made as the DBMS will have a query language/ QBE form.
• Unproductive maintenance is eliminated as changes only need to be made once (rather than changing
multiple programs).
• Fields can be added or removed without any effect on existing programs (that do not use these fields).
• Security / privacy of the data is improved as each application only has access to the fields it needs.
• There is better control of data integrity as the DBMS (uses its Data Dictionary) to perform validation checks
on data entered.
Examiner’s Report
Question 8
(a)(i) Many candidates were able to correctly expand this commonly used abbreviation.
Page 2 of 10
Computer Science 9608
Topical Past Papers with Answers
(iii) Candidates need to improve their understanding of the use of a query processor, which is just one of the
many features of a DBMS. Some candidates gave a good example of use, but only a very few candidates
could describe the generic process of setting up search criteria in order to retrieve data.
(iv) This question asked ‘how the DBMS has replaced software that used a file based approach’. It is not enough
to simply identify the problem with the file-based approach, as the question asked ‘how’. Further detail is
needed describing the way in which the DBMS software overcomes the problem identified. Also, the
question says ‘replaced software that used a file-based approach’. Many candidates overlooked the fact that
the DBMS was replacing a different software package and wrote about the advantages of a DBMS over a
paper-based filing system. This is also an area where the use of the correct terminology is essential. There
was considerable confusion between the use of ‘file’ and ‘record’.
May/June 2016.P13
Page 3 of 10
Computer Science 9608
Topical Past Papers with Answers
Question 5
(a) This is a clear example of an instance where many candidates had not read the question properly. The
question says, ‘Draw a line to match each feature with its description’. There were three feature boxes in the
question, so candidates should have drawn three lines, one from each box. Most candidates were able to
correctly connect the data dictionary to its description, but there was considerable confusion here between
data security and data integrity.
May/June 2019.P11
• Data dependency // changes to data means changes to programs accessing that data
• Lack of data integrity // entries that should be the same can be different in different places
• Lack of data privacy // all users have access to all data if a single flat file [3]
(b)(ii) 1 mark for each correct name, 1 mark for each matching description, max 2 marks per level
• External
• Conceptual
• Describes the data as seen by the applications making use of the DBMS
• Physical / Internal
Page 4 of 10
Computer Science 9608
Topical Past Papers with Answers
Examiner’s Report
Question 2
(b)(i) Many candidates found this question challenging. Some candidates showed a good understanding of the
limitations of a file based approach to storing data. There was some confusion with the storage of files on an
external device, with descriptions of directory structures and file access techniques.
(ii) A minority of candidates answered this question well. Candidates need to improve their understanding of
database schema.
May/June 2019.P12
• Because each record/piece of data is stored once and is referenced by a (primary) key
• Security ensures that data is safe from unauthorised access // safe from loss
Page 5 of 10
Computer Science 9608
Topical Past Papers with Answers
• Restrict actions (e.g. read / read-write) of specific users // unauthorised users cannot access the database
• Views
• Automatic Backup
• Encryption
• Query Processor
Page 6 of 10
Computer Science 9608
Topical Past Papers with Answers
Question 5
(a)(i) The majority of candidates correctly stated that data redundancy referred to the duplication of data.
(ii) Many responses included a statement about normalisation and there were a small number of excellent
descriptions of the normalisation process. Some candidates need to improve their understanding of
relational databases. There were many answers that mentioned multiple tables but few descriptions of how
the data was stored and linked. This is another question where the precise use of terminology is important.
There was considerable confusion between tables and databases, with the word database frequently being
incorrectly used to refer to a table within the database.
(b)(i) Many candidates correctly explained the difference between security and integrity. A small number of
candidates need to improve their understanding of this topic. It is also not enough, at this level of study, to
simply repeat the wording of the question. It is not enough to say, ‘security is keeping data secure’. There
needs to be some explanation of the meaning of ‘keeping data secure’.
(ii) This question is one that needs to be read carefully. It asks for two security features of a DBMS. There were
some very good answers. Other responses referred to security measures such as firewall and anti-virus
software that are not part of the DBMS.
(iii) The majority of candidates need to improve their understanding of the terms query processor and developer
interface.
May/June 2019.P13
• Stores all the information about the database // data about the data // metadata about the data
Page 7 of 10
Computer Science 9608
Topical Past Papers with Answers
Question 3
(a)(i) Many candidates found this part question challenging and need to improve their understanding of what is
meant by a data dictionary.
(ii) There were a small number of very good answers to this question and most candidates understood that a
query processor would resolve queries. A significant number of candidates were quite vague in their
reference to searching for data and displaying results. Many candidates found describing the purpose of a
query processor to be quite challenging.
Oct/Nov 2019.P12
4 (a)(i) 1 mark per bullet point, max 3 marks from any group to max 4
• ... and associated data will be automatically updated // referential integrity can be enforced
• ... which eliminates unproductive maintenance // which makes it easier to maintain the data
• ... the structure of data can change and does not affect program
• ... the structure of programs can change and does not affect data
Page 8 of 10
Computer Science 9608
Topical Past Papers with Answers
• ... to search / find specific data // specific example related to the sports club
Examiner’s Report
Question 4
(a)(i) Many candidates need to improve their understanding of the features of a relational database. An example
of a good answer is ‘In a relational database, multiple tables are linked together which reduces data
redundancy and improves data integrity. Different users can be given different views of the data, so they do
not see confidential information and data privacy is maintained’.
Page 9 of 10
Computer Science 9608
Topical Past Papers with Answers
3 (b) 1 mark per bullet point to max 2 plus 1 mark for suitable example for each DBMS tool
Developer Interface
Query processor
• To search for data that meets set criteria, e.g. all bookings for next week
• To perform calculations on extracted data, e.g. number of empty rooms tomorrow [5]
Examiner’s Report
Question 3
(b) Many candidates need to improve their understanding of these DBMS tools. There were more correct
responses for the Query Processor than the Developer Interface. Examples of good answers are ‘A developer
interface allows user-friendly forms and reports to be created. An example of a report might be to show all
the rooms available on a certain date. A query processor allows a user to create queries to select data based
on certain criteria, which might then be displayed on a form. An example of a query might be to list all the
customers with more than one booking on a particular date’.
Page 10 of 10