0% found this document useful (0 votes)
88 views67 pages

Igcse Ict CHPT 18 Databases

The document outlines the learning objectives and key concepts related to data manipulation in IGCSE ICT, including database structures, types of databases (flat file and relational), and essential components like fields, records, and keys. It discusses the advantages and disadvantages of flat file and relational databases, as well as the importance of forms, queries, and reports in data management. Additionally, it covers data types and the steps involved in creating a database, including importing data and setting validation rules.

Uploaded by

nabbouhmariam771
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views67 pages

Igcse Ict CHPT 18 Databases

The document outlines the learning objectives and key concepts related to data manipulation in IGCSE ICT, including database structures, types of databases (flat file and relational), and essential components like fields, records, and keys. It discusses the advantages and disadvantages of flat file and relational databases, as well as the importance of forms, queries, and reports in data management. Additionally, it covers data types and the steps involved in creating a database, including importing data and setting validation rules.

Uploaded by

nabbouhmariam771
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 1

meshioye_joshua@yahoo.com
Learning Objectives:
I will be able to ;
 Design and use suitable software tools to create
an appropriate database record structure
 Design and use suitable software tools to create a
data entry form appropriate to purpose and
audience.
 Use arithmetic operations or numeric functions to
perform calculations within a database
 Use suitable software tools to produce reports to
display data appropriate to purpose and audience

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 2
meshioye_joshua@yahoo.com
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 3
meshioye_joshua@yahoo.com
Database: A Database is a set of logically related
files/tables, organized in such a way that access to
the data is improved and redundancy is minimized. A
Database is a collection of logically related files
organized into a common pool that provides data for
one or more users.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 4
meshioye_joshua@yahoo.com
Field: A field consists of a group of characters,
representing a specific item of data or an individual
data item. E.g. Sex, Age, Name , Address.
Column: It contains all the information of a single
type i.e. a field or Attribute.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 5
meshioye_joshua@yahoo.com
Records: A record is a collection of related field. E.g.
students’ records , customer’s records, etc.
Row: Rows in a database table contains an employee
or a student record , also called Tuple.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 6
meshioye_joshua@yahoo.com
File/Table: A file is a collection of related records
treated as one unit.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 7
meshioye_joshua@yahoo.com
Primary key: The key field of a table which is
unique and identifies each record. The primary key
uniquely identifies each record in a database table.
Primary keys must contain unique values.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 8
meshioye_joshua@yahoo.com
A primary key column cannot contain NULL values.
Each table can have only one primary key. E.g.
Customer_ID, Admission_no , Reg_no,
Medical_ID_number, Book _ID, Borrower_ID,
Car_Plate_Reg_no, Product_code.
Customer Table

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 9
meshioye_joshua@yahoo.com
Foreign key: A foreign key is a field in a table that
uniquely identifies or refers to the primary key in
another table. It is used to create the relationship
between the two tables.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 10
meshioye_joshua@yahoo.com
Placeholders: for media such as images, sound
bites and video clips are used to enhance the
usability of a database.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 11
meshioye_joshua@yahoo.com
1. Flat file database
A flat file is a database that consists of a single table
with no relationships. It is like looking at all the data
in a single worksheet in a spreadsheet.
It is called ‘flat’ because it only has two dimensions-
fields and records.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 12
meshioye_joshua@yahoo.com
This is an example of a simple flat file to store data
about cars
Car Table

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 13
meshioye_joshua@yahoo.com
The flat file below stores data about driving lessons, the cars
used and the learners taking the lessons.
Lesson Table
The data about the car is repeated and the data about the
learner driver taking lessons is also repeated.
This example only contains a small amount of redundant
data.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 14
meshioye_joshua@yahoo.com
Redundant data is data that is unnecessarily repeated.
Redundant data uses up additional memory. It can also cause
problems with inconsistency and maintaining the flat file.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 15
meshioye_joshua@yahoo.com
Advantages of Flat file databases
 They are often simple to set up as sometimes data
can be entered into the file without needing to
set up data types, field sizes or relationships.
 They can be shared easily through email and
across the internet because the data is not
dependent upon specific file types or software.
 It is also easy to add additional information to a
flat file because it’s a simple case of adding new
columns. As all the data is in one single table.
 Flat file is also very quick for the computer to
process the data. Flat files are used when
processing speed is essential.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 16
meshioye_joshua@yahoo.com
Advantages of Flat file databases (Contd.)
 Flat files would be used in transactional
processing systems such as when processing
monthly salary payments by updating the master
payment file from employee transactions such as
hours worked and expenses claimed.
 All records are stored in one place
 Easier to understand or use
 Sorting is simpler
 Filtering is simpler
 Can be used with a spreadsheet or single table
DBMS.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 17
meshioye_joshua@yahoo.com
Relational Database: This is type of database that
stores information in table (rows and columns of
data) and conducts searches by using data in
specified columns of one table to find additional
data in another table.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 18
meshioye_joshua@yahoo.com
Relational databases are more useful when data
needs to be managed properly. They resolve
the problems of data, inconsistencies and
redundant data by using related tables.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 19
meshioye_joshua@yahoo.com
The flat file in the previous example could be stored in a
relational database as a set of three tables:
Lesson Table

Car Table

Learner Table

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 20
meshioye_joshua@yahoo.com
Advantages of Relational Databases
 Less data entry .Data is stored only once ,and it
avoids duplication of data
 Less inconsistency of data
 Easier to edit data or records
 Easier to edit data or record format
 Easier to add , delete data or records
 More complex queries can be carried out
 Better security
 More ability to cater for future requirements
/expansion
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 21
meshioye_joshua@yahoo.com
Disadvantages of Relational Databases
 More complex than a flat file database as more tables
are required
 Takes more time to set up
 More of a reduction in performance if many tables are
needed
 Slower extraction of meaning from data
 Less robust due to broken keys and records. Each
table requires a key field and relationships to other
tables
 More developer expertise or personnel to run the
database:
 More expensive to create a relational database
 More processing power needed for complex queries.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 22
meshioye_joshua@yahoo.com
Flat-file database Relational database

Poor at complex queries Complex queries can be carried out

Poor at limiting access to data Better security

Harder to update records, so Easy to records, and it caters for future


inherently inefficient requirements
Potential duplication Data is only stored once, and no
duplication
Easy to design Require more planning

Non-unique records Unique records, it uses primary key to


uniquely identify records

Harder to change data format. Easy to change data format/types


COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 23
meshioye_joshua@yahoo.com
 Tables: A Table consist of rows and columns. Tables are
made up of records which contain all of the
information about a single item, such as an employee
or student. Each record (rows) is then sub-divided
into fields (columns).

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 24
meshioye_joshua@yahoo.com
 Relationship: the way which two entities in two
different tables are connected.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 25
meshioye_joshua@yahoo.com
 Forms: Forms are used to collect and organize
information. In forms, you can enter data into your
database, display the data for review, and print it
out. Forms are designed to make data entry easier.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 26
meshioye_joshua@yahoo.com
 Queries: A query’s design tells the DBMS exactly
which data to retrieve. With queries you can look
at selected data from one or more tables.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 27
meshioye_joshua@yahoo.com
 Reports: A report provides a way to retrieve selected
stored data and present that information effectively and
meaningful. Reports are designed to be printed out, so
they need to be carefully planned. E.g. of everyday
reports includes, sales, summaries, account balances,
e.t.c.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 28
meshioye_joshua@yahoo.com
 Label: is used to advertise a product or address
labels for mailing letters to customers.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 29
meshioye_joshua@yahoo.com
The first step in creating a database is to create the file
that will be used. Other steps can then include creating:
 A Table OR
 Import data from existing data file
 Create fields and set Data Types
 Select Primary and Foreign keys
 Set Validation rules
 Set up relationships between tables. Link the
database tables using a primary/foreign key
 Create Data Entry Forms
 Create and run Queries
 Create /generate Reports.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 30
meshioye_joshua@yahoo.com
Importing Data
Data can be imported from text files so that data that
has been created in another system or for another
purpose can be used within the database. The text files
must be structured in such a way that fields can be
recognised and records can be separated.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 31
meshioye_joshua@yahoo.com
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 32
meshioye_joshua@yahoo.com
 Numeric: as a data type includes numbers that begins
with numbers greater than zero. They can also be
numbers with decimal places, integers, or
percentages.
 Text: as a data type can be used as any letters from
the alphabet and some numbers. Text as a data type is
one of the broadest groups because you can always
use text for almost any types of data. It is not as
restrictive as some of the other data types.
 Date/Time: as a data type includes several different
formats of dates and times. The different formats of
date/time include General, Long, Medium or Short.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 33
meshioye_joshua@yahoo.com
 Currency: as a data type includes all the
currency symbols in the world. The procedure is
that you would have to change the region and
language settings in the control panel of your
computer first.
 Boolean/Logical (1/0, Yes/No , True/False): as a
data types can be useful for saving a lot of space
in your database because a question could be
posed and the answer needn’t be a long wordy
answer for every record but a simple 1 or 0, true
or false. An example could be “Male” or
“Female” ?

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 34
meshioye_joshua@yahoo.com
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 35
meshioye_joshua@yahoo.com
Data Types Examples
Field Name Example(s) Data Type
Student_Name Cole Donald Text
Dan-Afred Felix Text/Alphanumeric

Student_ID 001 Number


WMS001 Text/Alphanumeric

Gender M or F Boolean
Height 1 Number (Integer )
1.65 Number (Decimal)

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 36
meshioye_joshua@yahoo.com
Field Name Example(s) Data Type
Staying_on/Leaving Yes/No Boolean
Date_of_Birth 03/10/2001 Date
21/03/1999

Examination Level IGCSE Text/Boolean


O Level Boolean ( If the two are the choices
available)
Phone_No 01452398678 Text
03552190332
Reasons:
 The field would not be used for
calculations
 There is a leading zero in the
data.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 37
meshioye_joshua@yahoo.com
Field Name Example(s) Data Type

Fee_Amount $10,000 Currency


N500,000

Payment_Status Yes/No Boolean

Cost_of_Books $17,000 Currency


55000 Currency/Numeric

Due_Date 06/12/2021 Date


COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 38
meshioye_joshua@yahoo.com
QUESTION
Maria is the principal of the International Municipal
school. She has employed Paulo, a systems analyst, to
create a new database system to store records of her
final year IGCSE students.
Examples of the details of the students which will be
stored are:
Velia Grimaldi, A3058, Female, 161, Leaving
Giuseppe Campo, A3072 , Male, 177, Staying on to 6th
form
Nicola Donati, B3085, Female, 173, Staying on to 6th
form
Giovanni Agnelli, C3102, Male, 172, Leaving
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 39
meshioye_joshua@yahoo.com
Complete the following table by entering the field
names and most appropriate data type for each field.
For any numeric field, specify the type of number.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 40
meshioye_joshua@yahoo.com
QUESTION
The owner of a gardening company is planning to
create a database to store the details of all his
customers. He has the choice of using a flat file
database or a relational database.
Discuss the advantages and disadvantages of using a
relational database rather than a flat file database.
................................................................
................................................................
.................. [8]

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 41
meshioye_joshua@yahoo.com
QUESTION
A school’s examinations officer has decided to
develop a database to store pupil details and the
examinations they are due to sit next summer. They
are going to use a relational database.
(a) Describe the steps involved in creating the
database.
................................................................
................................................................
........... [4]

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 42
meshioye_joshua@yahoo.com
Validation is a process where data is checked to see
if it satisfies certain criteria when input into a
computer. For example, to see if the data falls
within accepted boundaries.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 43
meshioye_joshua@yahoo.com
Validation Rules
Database management systems can apply validation
rules to data that is input. If data passes the
validation rules, then they will be accepted. If data
fail the validation rules, then they will be rejected
and an error message may be shown.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 44
meshioye_joshua@yahoo.com
In this database, the user is attempting to enter the
title. They have four valid options - “Mr”, “Mrs”,
“Miss” or “Dr”.
The user has accidentally entered “n” which is not a
valid option. An error message has appeared telling
the user what to do to fix the problem.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 45
meshioye_joshua@yahoo.com
i. Range Check: Checks whether data is within
given/acceptable values. E.g. A person’s age should be in
range > 0 but < 150.
ii. Length Check: Checks if the input data contains the
required number of characters. E.g. If a field needs six
digits then inputting a five- or seven-digit number, for
example should cause an error message.
iii. Character/type Check: Checks that the input data
does not contain invalid characters E.g. A person’s name
should not contain any numbers, but a person’s height
should only contain digits.
iv. Format/picture Check: Checks that data is in a
specific format E.g. Date should be in the form
dd/mm/yyyy.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 46
meshioye_joshua@yahoo.com
v. Limit Check: Similar to range check except that
only one of the limits (boundaries) is checked E.g.
Input data must be > 10.
vi. Presence Check: Checks if data is actually
present and has not been missed out. E.g. In an
electronic form, a person’s telephone number may be
a required field ,and if no data is present this should
give rise to an error message.
vii. Consistency Check: Checks if fields correspond
(tie up) with each other E.g. If ‘Mr’ has been typed
into a field called title, then the gender field must
contain either ‘M’ or ‘Male.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 47
meshioye_joshua@yahoo.com
Validation Checks Examples
Field Name Example(s) Validation Check
Student_Name Peder Verceo Type check
Cole Donald Type ( must be letters/alphabets)

Phone_No 01452398678 Length check/ Format check


03552190332 Format check (must start with digit 0,+, etc.)

Date_of_Birth 09/02/1980 Format check /Length check


01/06/1977 Format check (2 digits slash 2 digits slash 4
digits)
Year_Left 2008 Length check/Range check/ Type check
2011

Department ICT Length check/Type check


MAT
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 48
meshioye_joshua@yahoo.com
Validation Checks Examples (Contd.)
Field Name Example(s) Validation Check
Examination_No NG074/001 Format check /Length check
NG074/023

Date_of_Examination 02/03/2020 Format check /Range check


06/03/2020 Format check (2 digits slash 2 digits slash 4
11/03/2020 digits)
Range check (within exam time-table dates)
Blood_Type A, or O, or AB, or B Lookup Check
Each can be + or -

Semester Autumn, or Spring, or Lookup Check


Summer
Number_of_Lates 5 Range/Type
12 Range ( must be within the number of days
the school opened)
Type ( must be number)

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 49
meshioye_joshua@yahoo.com
Online Data Entry Form /Screen Layout Form

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 50
meshioye_joshua@yahoo.com
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 51
meshioye_joshua@yahoo.com
Design or Components of an Online Data Entry Form
 Appropriate/suitable title
 The name fields
 Appropriate spacing for each field
 Use of text/character boxes
 Use of a calendar for date
 Drop down list/ radio button
 Look up option
 Search button
 Use of navigation buttons. Forward or backward
buttons
 Information attempts to fill the page ,and design looks
appropriate to scenario
 Instructions/help buttons
 Submit buttons.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL:
52
meshioye_joshua@yahoo.com
Database Query
Data Search Criteria Input in Query

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 53
meshioye_joshua@yahoo.com
TEXT Search Criteria
Query Function
“science” Find exact text science
Like *A* Find Data/Text that contain letter A
Not like *A* Find Data/Text that do not contain letter A
Like A* Find Data/Text that beginning with letter A
Like *A Find Data/Text ending with letter A
* Find Text not blank
Null Find Text blank
“?????” Find Words that are exactly 5 letters long

>= “M” Find Data/Text that come before M in alphabetical


order
<= “M” Find Data/Text that come after M in alphabetical order
Yes Find values that are Yes/True
No Find values that are No/False
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 54
meshioye_joshua@yahoo.com
NUMBERS Search Criteria

Query Function

50 Find specific value (50)


Not 50 Find value Not equal to 50
<50 Find values less than 50
<=50 Find values less than or equal to
50
>50 Find values greater than 50
>=50 Find values greater than or equal
to 50
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 55
meshioye_joshua@yahoo.com
DATE Search Criteria

Query Function
#01/01/2020# Find a specific date
<01/03/2020 Find dates before a certain date
>01/03/2020 Find dates after a certain date
=Date() Find records containing today’s date
>=Date()-X Find records containing dates X or more
days in the past.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 56
meshioye_joshua@yahoo.com
Syntax/Format:
New Field:[Field 1] + [Field 2]
Examples:
Calculated Field Meaning

Total_Enrolled:[Male]+[Female] The query generates a new field called Total


Enrolled at run time, by adding the Male field and
the Female field.
Employee_Wage:[Prob_Wage]*1.12 The query generates a new field called Employee
Wage at run time, by multiplying the Prob Wage
field by a 12 percent increase ( 100% + 12%=
112% or 1.12).

Volume:[Lenght]*[Width]*[Thickness] The query generates a new field called Volume at


run time, by multiplying the Length field, by Width
field, by the Thickness field.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 57
meshioye_joshua@yahoo.com
The calculations will ONLY work if placed in the report footer.

Function/Use Calculated Field Code

Count number of fields in a report =COUNT([Primarykey_field])


Always use primary key field , as it is the only
unique field
Sum/addition of fields in a report =SUM([Field_name])

Average/mean of fields in a report =AVG([Field_name])

Minimum (smallest value) of fields in =MIN([Field_name])


a report
Maximum (largest value) of fields in a =MAX([Field_name])
report
Value of Stock in a report =SUM([Field_name1]*[Field_name2])
E.g. =SUM([Price]*[Volume])

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 58
meshioye_joshua@yahoo.com
 Records can be searched or sorted very quickly
 Useful if there are hundreds or thousands of
records to be stored
 Records can be easily edited
 Easy adding or deleting of records
 The data in the database can be backed up easily
 Easy archiving or preserving of record
 Far more secure than other method of keeping
data
 It can be password protected/secured.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 59
meshioye_joshua@yahoo.com
 Need IT skills
 Need to have to correct software
 Can take up a lot of storage space or memory in
the computer
 The software could be expensive to buy
 Training on how to use the software could be
expensive.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 60
meshioye_joshua@yahoo.com
 Student scans a card or teacher records the student as
present on computer system
 System records time of arrival
 System sends the data to the school administration
database
 The data is searched in the database
 If student arrives after a certain time the student’s
attendance record is flagged as late or absent
 Attendance or lateness records are automatically
printed or sent to parents
 Letters or texts are automatically sent to parents to
show absenteeism or lateness of students
 Parents can logon to the system to check student’s
attendance/lateness records.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 61
meshioye_joshua@yahoo.com
 The information is more up to date
 Information about the student can be obtained quickly
after fire or emergency
 Information regarding patterns of absence can be found
quickly
 Helps to tackle truancy or lateness
 Parents can be informed automatically about patterns of
lateness or attendance
 Lateness is entered consistently in the school
 Automatic lateness reports for the form tutor can be
generated
 Accurate and up to date records if there is a fire
 Speeds up the process as attendance is not marked
manually.
COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 62
meshioye_joshua@yahoo.com
QUESTION
A school’s examinations officer has decided to
develop a database to store pupil details and the
examinations they are due to sit next summer. They
are going to use a relational database.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 63
meshioye_joshua@yahoo.com
Write the search criteria to search for all
examinations which will be sat after 26/06/2018,
using at least one of the following operators >, >=,
<, <=, = .
......................................................... [2]
(d) Apart from presence check, name and describe a
suitable validation check for each of the following
fields in the database, based on the data shown in
part (b).
Examination_ID..................................
Date_of_exam....................................[ 4]

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 64
meshioye_joshua@yahoo.com
QUESTION
Tawara Health Centre is creating a new online appointment
system for its patients.
The developer has created a table showing part of the file
structure of the new database.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 65
meshioye_joshua@yahoo.com
(a) Apart from presence check, for each field, name
an appropriate validation check that could be used.
Your answer should be different in each case.

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 66
meshioye_joshua@yahoo.com
(b)Referring to the fields in the table, name the
most appropriate field that could be used as a
primary key.
.................................................................
.................................................................
......... [1]

COURSE: IGCSE ICT , CHAPTER 18 ( Data Manipulation ) , TUTOR: MESHIOYE JOSHUA , EMAIL: 67
meshioye_joshua@yahoo.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy