DP Computer Science Questionbank
Option A: Databases
Path: |
Description
[N/A]Directly related questions
-
19M.2.SL.TZ0.1a:
Construct the entity-relationship diagram (ERD) for this scenario.
-
19M.2.SL.TZ0.3a:
Outline two reasons why databases are normalized.
-
19M.2.SL.TZ0.1b:
Outline why data validation is difficult for the Book_Title attribute.
-
19M.2.SL.TZ0.3b:
Outline why the SALES_PERSON table is not in 1st Normal Form (1NF).
-
19M.2.SL.TZ0.1c:
State the result from the following query:
SELECT Book_Title
FROM BOOK
WHERE Genre = "Non-fiction"
AND ISBN = '0-98124-612-2' -
19M.2.SL.TZ0.1f:
Outline how data consistency can be maintained in transactions in this database system.
-
19M.2.SL.TZ0.1d:
Construct a query to find the titles of the books published by “Orlando Crux”.
-
19M.2.SL.TZ0.2b:
Describe two ways that data security in the school's database can be maintained.
-
19M.2.SL.TZ0.3c:
Construct the 3rd Normal Form (3NF) of the unnormalized relation shown above.
-
19M.2.SL.TZ0.3d:
Outline why it is necessary to ensure that referential integrity is maintained in databases.
-
19M.2.SL.TZ0.1e:
Outline why atomicity is important within a database.
-
19M.2.SL.TZ0.3e:
Outline why a primary key may consist of more than one attribute.
-
19M.2.SL.TZ0.1g:
Some data in the MRBS database is redundant.
Outline one problem caused by redundant data.
-
19M.2.SL.TZ0.2a:
Explain how concurrent use of the school database is possible in this situation.
-
19M.2.SL.TZ0.2c.i:
Describe one strategy that could be used to ensure the data can be recovered if the database becomes corrupted.
-
19M.2.SL.TZ0.2c.ii:
Suggest how the privacy of student data can be ensured.
-
19M.2.HL.TZ0.4c:
Compare cluster analysis and classification as techniques for discovering patterns in ZCC's data.
-
19M.2.HL.TZ0.4a.i:
Outline why data warehousing is time dependent.
-
19M.2.HL.TZ0.4a.ii:
Outline one reason why ZCC uses a data warehouse.
-
19M.2.HL.TZ0.4b:
Outline why transformation of the data is necessary prior to it being loaded into the data warehouse.
-
19M.2.HL.TZ0.4d:
Describe how the process of deviation detection can be applied to identify customers who are likely to miss the payment deadline for their purchases from ZCC.
-
19M.2.HL.TZ0.4e:
ZCC is aware that other data mining and detection techniques will allow more informed marketing decisions to be made.
Explain how database segmentation and link analysis can be used by ZCC to improve their marketing strategies.
-
17N.2.SL.TZ0.1c:
Identify two different types of relationships within databases.
-
17N.2.SL.TZ0.1e:
Identify four responsibilities of a database administrator.
- 17N.2.SL.TZ0.2b.ii: State the entity for this example relation.
-
17N.2.SL.TZ0.1a:
Define the term database transaction.
-
17N.2.SL.TZ0.1b:
Explain the importance of durability in a database transaction.
-
17N.2.SL.TZ0.1d:
Describe the nature of the data dictionary.
- 17N.2.SL.TZ0.2c: Identify an appropriate data type for Student_ID.
-
17N.2.SL.TZ0.3a.i:
State what is meant by redundant data in databases.
-
17N.2.SL.TZ0.2a:
With reference to the relation CLASS_TABLE distinguish between data and information.
- 17N.2.SL.TZ0.2b.i: Define the term entity.
-
17N.2.SL.TZ0.2d:
Explain the role of data validation and data verification.
-
17N.2.SL.TZ0.2e:
Explain how Total could be validated.
-
17N.2.SL.TZ0.2f.i:
Describe the steps in a query that will output the names of all students who earned the maximum mark on Exam_Two.
-
17N.2.SL.TZ0.3c:
Explain why a compound key is used for the SCHOOL_VOLUNTEERS_TABLE relation.
-
17N.2.SL.TZ0.2f.ii:
Describe the steps in a query that will output the Student_IDs of all candidates who passed.
-
17N.2.SL.TZ0.3b:
Identify three characteristics of the 1st Normal Form (1NF) which are evident in this relation.
-
17N.2.SL.TZ0.3a.ii:
Explain one issue that can be caused by redundant data in a database.
-
17N.2.SL.TZ0.3d:
The following shows the normalized SCHOOL_VOLUNTEERS_TABLE relation:
SCHOOLS_TABLE
Code, School_Name, AddressVOLUNTEERS_TABLE
Code, Date, Num_VolunteersDiscuss whether these relations are in third normal form (3NF).
-
17N.2.HL.TZ0.4b:
Define a spatial database.
-
17N.2.HL.TZ0.4c.ii:
Explain one benefit of database segmentation to the telecommunication company.
- 17N.2.HL.TZ0.4c.i: State what is meant by database segmentation.
-
17N.2.HL.TZ0.4e:
Distinguish between the use of association and sequential patterns as data mining techniques.
-
17N.2.HL.TZ0.4d:
Explain how ETL processes could be used in data preparation.
-
17N.2.HL.TZ0.4f:
Describe how deviation detection could be used to detect fraud at the telecommunications company.
-
17N.2.HL.TZ0.4g:
Customers who decide to leave the telecommunication company for a competitor may result in huge losses for the telecommunications company.
Explain with the use of an example, how predictive modelling could be used to optimize information sent to existing customers.
-
17N.2.HL.TZ0.4a:
Evaluate the use of an object-oriented database as opposed to a relational database.
-
18N.2.SL.TZ0.3d:
Construct the database in the 3rd normal form (3NF) using the notation
Greengrocer (Prod_ID, Prod_Name, Prod_Price, Supp_Name, Supp_Contact, Supp_Phone)You must show all your workings.
You must show all your workings.
-
18N.2.SL.TZ0.1b:
A bank maintains a database that stores details of clients and their accounts.
A client wants to transfer money between two accounts held at the same bank.
Explain how the ACID (Atomicity, Consistency, Isolation, Durability) properties would apply in the context of this database transaction.
-
18N.2.SL.TZ0.2a:
Define the term database management system (DBMS).
-
18N.2.SL.TZ0.1a:
Outline the difference between an information system and a database.
-
18N.2.SL.TZ0.3c.i:
Explain the problems that may arise for the following function performed on the given relation. In your answer, you should give an appropriate example: Inserting a new tuple with an item that is supplied by existing supplier.
-
18N.2.SL.TZ0.1c:
A bank holds large volumes of financial and personal information about its clients in its database.
Discuss whether this database should be open to interrogation by the police or the Government. -
18N.2.SL.TZ0.2b:
Identify three characteristics of logical schema.
-
18N.2.SL.TZ0.2c:
Outline the purpose of a data definition language (DDL).
-
18N.2.SL.TZ0.2d:
Identify two tasks that a database administrator carries out to ensure the security of the database.
-
18N.2.SL.TZ0.3a.i:
Identify an appropriate data type for Prod_Price.
-
18N.2.SL.TZ0.3a.ii:
Construct the steps in a query to output the names of all products supplied by Veggy Co. with prices in the range from 4.00 to 10.00 inclusive.
-
18N.2.SL.TZ0.3b:
Outline the redundant data in this relation.
-
18N.2.SL.TZ0.3c.ii:
Explain the problems that may arise for the following function performed on the given relation. In your answer, you should give an appropriate example: Deleting a tuple from the relation.
-
18N.2.SL.TZ0.3c.iii:
Explain the problems that may arise for the following function performed on the given relation. In your answer, you should give an appropriate example: Modifying a specific attribute value in the tuple.
-
18N.2.HL.TZ0.4b:
Outline two differences between a data warehouse and database.
-
18N.2.HL.TZ0.4d:
Outline one ethical problem that may result from data mining.
-
18N.2.HL.TZ0.4e:
Explain how cluster analysis can be used to improve the advertising strategy of the tourism companies.
-
18N.2.HL.TZ0.4a:
Identify four sources of information that could be incorporated in the data warehouse.
-
18N.2.HL.TZ0.4c:
Explain how the Extract, Transform, Load (ETL) processes can be used to address the problems related to data migration.
-
18N.2.HL.TZ0.4f:
Explain the importance of link analysis in exploring patterns in data mining.
-
19N.2.SL.TZ0.1b:
Outline one reason why there may be concerns about the amount of personal information that is requested.
-
19N.2.SL.TZ0.1c:
Outline why the transaction needs to be atomic in the context of this scenario.
-
19N.2.SL.TZ0.1d:
Explain how transactions are managed to ensure isolation when registered teachers add comments to a discussion thread on the forum.
-
19N.2.SL.TZ0.1e:
Identify two tasks that are carried out by the database administrator (DBA).
-
19N.2.SL.TZ0.2a:
Construct an entity-relationship-diagram that shows the relationships between the class, order and family.
-
19N.2.SL.TZ0.1a:
Identify one reason why the teacher’s name has been split into two fields.
-
19N.2.SL.TZ0.1f:
The DBA is considering using the email address as the primary key, but is concerned that many of the 250 000 educators who are registering for this online forum may have more than one email address. Users may create duplicate accounts, deliberately or accidently, by using different email addresses as usernames.
Explain the factors that would need to be considered in using a composite primary key instead of only using the email address.
-
19N.2.SL.TZ0.2b.i:
Outline, using an example, how data validation can ensure that data is entered into the birds database correctly.
-
19N.2.SL.TZ0.3b:
Outline why data redundancy may be a problem in the LORRY table.
-
19N.2.SL.TZ0.2b.ii:
Outline, using an example, how data verification can ensure that data is entered into the birds database correctly.
-
19N.2.SL.TZ0.3c:
Identify the steps to create a query to find the names and telephone numbers of the drivers who drive lorries that have more than 60 cubic metres of trailer space.
-
19N.2.SL.TZ0.2c:
Distinguish between data and information when entering the length of a spoonbill’s beak in the database.
-
19N.2.SL.TZ0.2f:
Explain, using the example described in the scenario, why referential integrity is important in databases.
-
19N.2.SL.TZ0.2d:
Identify two characteristics of a conceptual schema.
-
19N.2.SL.TZ0.2e:
Explain why the use of data modelling is critical to the success of a database, such as the one used in this scenario.
-
19N.2.SL.TZ0.3a:
Identify two characteristics that make a database unnormalized.
-
19N.2.SL.TZ0.3d:
Normalize the database to 3NF. Use the same format as shown, ensuring that primary keys are clearly indicated by underlining them.
-
19N.2.HL.TZ0.4a:
Explain two advantages of using a relational database rather than an object-oriented database.
-
19N.2.HL.TZ0.4b:
State two characteristics of a data warehouse.
-
19N.2.HL.TZ0.4g:
Once data has been loaded into a data warehouse it can be mined. The use of data analytics is believed to have been important to the outcome of the US election campaign.
Discuss whether the advantages of data mining techniques in this scenario outweigh the disadvantages.
-
19N.2.HL.TZ0.4c:
Outline why data needs to be transformed before it can be loaded into the data warehouse.
-
19N.2.HL.TZ0.4d:
Outline why opinion poll data and other election data are timestamped when added to the data warehouse.
-
19N.2.HL.TZ0.4f:
Outline why analytics companies use deviation detection.
-
19N.2.HL.TZ0.4e:
Outline why analytics companies use link analysis.
-
20N.2.SL.TZ0.1c:
Explain two reasons why medical information should not be stored in the Person table.
-
20N.2.SL.TZ0.1d:
Outline two issues caused by storing redundant data.
-
20N.2.SL.TZ0.3c.ii:
Outline why the inclusion of a derived field will not affect the normalization of a database.
-
20N.2.SL.TZ0.1a:
Construct the entity-relationship diagram (ERD) that shows the relationship between the individual, their driving license, and their vehicle(s).
-
20N.2.SL.TZ0.1e:
Outline two situations where data stored by the Driving Licensing Agency may need to be open to interrogation by other parties.
-
20N.2.SL.TZ0.2d:
Explain how the Billetmania database management system ensures that a seat is not booked by two people simultaneously.
-
20N.2.SL.TZ0.1b:
Explain why Date of birth has been separated into three fields.
-
20N.2.SL.TZ0.2a:
Define the term database transaction.
-
20N.2.SL.TZ0.2b:
Outline how the Billetmania information system would utilize a database.
-
20N.2.SL.TZ0.3a:
Define the term record.
-
20N.2.SL.TZ0.2c:
Explain the importance of transaction durability to Billetmania when clients book tickets.
-
20N.2.SL.TZ0.3b:
Identify the steps to create a query to find the vineyards and names of fruity wines where the quantity in stock is between 25 and 35 bottles.
-
20N.2.SL.TZ0.3c.i:
Identify the steps to create a non-persistent derived field called
TotalPrice
, which would hold the total value of wine stored for each record. -
20N.2.SL.TZ0.3d:
Construct the 3rd Normal Form (3NF) of the unnormalized Wine file.
-
20N.2.SL.TZ0.3e:
Outline why a single-field primary key is not always an appropriate solution for normalized databases.
-
18M.2.SL.TZ0.1c:
Identify the steps to create a query to find the names of customers whose account balance is greater than $300 000.
-
18M.2.SL.TZ0.1d:
Explain how controlling access rights contributes to the security of the Galaxy Bank database.
-
18M.2.SL.TZ0.2a:
Identify two types of update anomaly.
-
18M.2.SL.TZ0.2b:
Outline two methods of database recovery that can be used to restore the system.
-
18M.2.SL.TZ0.2d:
Customers can choose a credit card as their method of payment. However, some customers are concerned that their personal information could get shared with unauthorized third parties.
Explain one way that the DBA at ShowTime can ensure the anonymity of the customers is maintained.
-
18M.2.SL.TZ0.3c:
Outline what would be necessary to make the above unnormalized table conform to 1st Normal Form (1NF).
-
18M.2.SL.TZ0.3d:
Construct the 3rd Normal Form (3NF) of the unnormalized relation shown above.
-
18M.2.SL.TZ0.1e:
Explain how row locking ensures the consistency of the data in the Galaxy Bank database.
-
18M.2.SL.TZ0.3a:
Explain one benefit of normalizing a database.
-
18M.2.SL.TZ0.3b:
Identify three ways that incorrect data could be prevented from being added into the School_phone_no field.
-
18M.2.SL.TZ0.1a:
Construct the entity relationship diagram (ERD) that shows the relationship between the bank branch, the customers and their loans.
-
18M.2.SL.TZ0.1b:
With reference to the table LOANS, state the output of the following query:
SELECT LOANS.Loan_ID, LOANS.Customer_ID, LOANS.Amount, LOANS.Type
FROM LOANS
WHERE (LOANS.Amount > 600000) AND ((LOANS.Type = "Home") OR
(LOANS.Type = "Venture")); -
18M.2.SL.TZ0.2c:
Identify three tasks that are carried out by the database administrator (DBA).
-
18M.2.SL.TZ0.3e:
Explain the difference between 2nd Normal Form (2NF) and 3rd Normal Form (3NF).
-
18M.2.HL.TZ0.4b:
Outline why data warehouses tend to use unnormalized data sets.
-
18M.2.HL.TZ0.4d:
Outline why data warehousing is time dependent.
-
18M.2.HL.TZ0.4e:
Explain why Basking Coats could use association analysis to improve the marketing of its products.
-
18M.2.HL.TZ0.4c:
Identify three precautions to be taken before extraction is carried out on the database.
-
18M.2.HL.TZ0.9a:
Explain how cluster analysis can be used to achieve the aims of the system that is described above.
-
18M.2.HL.TZ0.4a:
Describe how deviation detection can be used to analyse this data.
-
18M.2.HL.TZ0.4f:
Basking Coats has decided to use an object-oriented database rather than a relational database to store its data.
Explain why Basking Coats would use an object-oriented database rather than a relational database to store its data.
Sub sections and their related questions
A.1 Basic concepts
-
18M.2.SL.TZ0.2a:
Identify two types of update anomaly.
-
18M.2.SL.TZ0.3b:
Identify three ways that incorrect data could be prevented from being added into the School_phone_no field.
-
19M.2.SL.TZ0.1b:
Outline why data validation is difficult for the Book_Title attribute.
-
19M.2.SL.TZ0.1e:
Outline why atomicity is important within a database.
-
19M.2.SL.TZ0.1f:
Outline how data consistency can be maintained in transactions in this database system.
-
19M.2.SL.TZ0.2a:
Explain how concurrent use of the school database is possible in this situation.
-
17N.2.SL.TZ0.1a:
Define the term database transaction.
-
17N.2.SL.TZ0.1b:
Explain the importance of durability in a database transaction.
-
17N.2.SL.TZ0.2a:
With reference to the relation CLASS_TABLE distinguish between data and information.
-
17N.2.SL.TZ0.2d:
Explain the role of data validation and data verification.
-
17N.2.SL.TZ0.2e:
Explain how Total could be validated.
-
18N.2.SL.TZ0.1a:
Outline the difference between an information system and a database.
-
18N.2.SL.TZ0.1b:
A bank maintains a database that stores details of clients and their accounts.
A client wants to transfer money between two accounts held at the same bank.
Explain how the ACID (Atomicity, Consistency, Isolation, Durability) properties would apply in the context of this database transaction.
-
19N.2.SL.TZ0.1c:
Outline why the transaction needs to be atomic in the context of this scenario.
-
19N.2.SL.TZ0.1d:
Explain how transactions are managed to ensure isolation when registered teachers add comments to a discussion thread on the forum.
-
19N.2.SL.TZ0.2b.i:
Outline, using an example, how data validation can ensure that data is entered into the birds database correctly.
-
19N.2.SL.TZ0.2b.ii:
Outline, using an example, how data verification can ensure that data is entered into the birds database correctly.
-
19N.2.SL.TZ0.2c:
Distinguish between data and information when entering the length of a spoonbill’s beak in the database.
-
20N.2.SL.TZ0.1b:
Explain why Date of birth has been separated into three fields.
-
20N.2.SL.TZ0.2a:
Define the term database transaction.
-
20N.2.SL.TZ0.2b:
Outline how the Billetmania information system would utilize a database.
-
20N.2.SL.TZ0.2c:
Explain the importance of transaction durability to Billetmania when clients book tickets.
A.2 The relational database model
-
18M.2.SL.TZ0.1a:
Construct the entity relationship diagram (ERD) that shows the relationship between the bank branch, the customers and their loans.
-
18M.2.SL.TZ0.1b:
With reference to the table LOANS, state the output of the following query:
SELECT LOANS.Loan_ID, LOANS.Customer_ID, LOANS.Amount, LOANS.Type
FROM LOANS
WHERE (LOANS.Amount > 600000) AND ((LOANS.Type = "Home") OR
(LOANS.Type = "Venture")); -
18M.2.SL.TZ0.1c:
Identify the steps to create a query to find the names of customers whose account balance is greater than $300 000.
-
18M.2.SL.TZ0.1d:
Explain how controlling access rights contributes to the security of the Galaxy Bank database.
-
18M.2.SL.TZ0.1e:
Explain how row locking ensures the consistency of the data in the Galaxy Bank database.
-
18M.2.SL.TZ0.3a:
Explain one benefit of normalizing a database.
-
18M.2.SL.TZ0.3c:
Outline what would be necessary to make the above unnormalized table conform to 1st Normal Form (1NF).
-
18M.2.SL.TZ0.3d:
Construct the 3rd Normal Form (3NF) of the unnormalized relation shown above.
-
18M.2.SL.TZ0.3e:
Explain the difference between 2nd Normal Form (2NF) and 3rd Normal Form (3NF).
-
19M.2.SL.TZ0.1a:
Construct the entity-relationship diagram (ERD) for this scenario.
-
19M.2.SL.TZ0.1c:
State the result from the following query:
SELECT Book_Title
FROM BOOK
WHERE Genre = "Non-fiction"
AND ISBN = '0-98124-612-2' -
19M.2.SL.TZ0.1d:
Construct a query to find the titles of the books published by “Orlando Crux”.
-
19M.2.SL.TZ0.1g:
Some data in the MRBS database is redundant.
Outline one problem caused by redundant data.
-
19M.2.SL.TZ0.2b:
Describe two ways that data security in the school's database can be maintained.
-
19M.2.SL.TZ0.3a:
Outline two reasons why databases are normalized.
-
19M.2.SL.TZ0.3b:
Outline why the SALES_PERSON table is not in 1st Normal Form (1NF).
-
19M.2.SL.TZ0.3c:
Construct the 3rd Normal Form (3NF) of the unnormalized relation shown above.
-
19M.2.SL.TZ0.3d:
Outline why it is necessary to ensure that referential integrity is maintained in databases.
-
19M.2.SL.TZ0.3e:
Outline why a primary key may consist of more than one attribute.
-
17N.2.SL.TZ0.1c:
Identify two different types of relationships within databases.
-
17N.2.SL.TZ0.1d:
Describe the nature of the data dictionary.
- 17N.2.SL.TZ0.2b.i: Define the term entity.
- 17N.2.SL.TZ0.2b.ii: State the entity for this example relation.
- 17N.2.SL.TZ0.2c: Identify an appropriate data type for Student_ID.
-
17N.2.SL.TZ0.2f.i:
Describe the steps in a query that will output the names of all students who earned the maximum mark on Exam_Two.
-
17N.2.SL.TZ0.2f.ii:
Describe the steps in a query that will output the Student_IDs of all candidates who passed.
-
17N.2.SL.TZ0.3a.i:
State what is meant by redundant data in databases.
-
17N.2.SL.TZ0.3a.ii:
Explain one issue that can be caused by redundant data in a database.
-
17N.2.SL.TZ0.3b:
Identify three characteristics of the 1st Normal Form (1NF) which are evident in this relation.
-
17N.2.SL.TZ0.3c:
Explain why a compound key is used for the SCHOOL_VOLUNTEERS_TABLE relation.
-
17N.2.SL.TZ0.3d:
The following shows the normalized SCHOOL_VOLUNTEERS_TABLE relation:
SCHOOLS_TABLE
Code, School_Name, AddressVOLUNTEERS_TABLE
Code, Date, Num_VolunteersDiscuss whether these relations are in third normal form (3NF).
-
18N.2.SL.TZ0.2a:
Define the term database management system (DBMS).
-
18N.2.SL.TZ0.2b:
Identify three characteristics of logical schema.
-
18N.2.SL.TZ0.2c:
Outline the purpose of a data definition language (DDL).
-
18N.2.SL.TZ0.3a.i:
Identify an appropriate data type for Prod_Price.
-
18N.2.SL.TZ0.3a.ii:
Construct the steps in a query to output the names of all products supplied by Veggy Co. with prices in the range from 4.00 to 10.00 inclusive.
-
18N.2.SL.TZ0.3b:
Outline the redundant data in this relation.
-
18N.2.SL.TZ0.3c.i:
Explain the problems that may arise for the following function performed on the given relation. In your answer, you should give an appropriate example: Inserting a new tuple with an item that is supplied by existing supplier.
-
18N.2.SL.TZ0.3c.ii:
Explain the problems that may arise for the following function performed on the given relation. In your answer, you should give an appropriate example: Deleting a tuple from the relation.
-
18N.2.SL.TZ0.3c.iii:
Explain the problems that may arise for the following function performed on the given relation. In your answer, you should give an appropriate example: Modifying a specific attribute value in the tuple.
-
18N.2.SL.TZ0.3d:
Construct the database in the 3rd normal form (3NF) using the notation
Greengrocer (Prod_ID, Prod_Name, Prod_Price, Supp_Name, Supp_Contact, Supp_Phone)You must show all your workings.
You must show all your workings.
-
19N.2.SL.TZ0.1a:
Identify one reason why the teacher’s name has been split into two fields.
-
19N.2.SL.TZ0.1f:
The DBA is considering using the email address as the primary key, but is concerned that many of the 250 000 educators who are registering for this online forum may have more than one email address. Users may create duplicate accounts, deliberately or accidently, by using different email addresses as usernames.
Explain the factors that would need to be considered in using a composite primary key instead of only using the email address.
-
19N.2.SL.TZ0.2a:
Construct an entity-relationship-diagram that shows the relationships between the class, order and family.
-
19N.2.SL.TZ0.2d:
Identify two characteristics of a conceptual schema.
-
19N.2.SL.TZ0.2e:
Explain why the use of data modelling is critical to the success of a database, such as the one used in this scenario.
-
19N.2.SL.TZ0.2f:
Explain, using the example described in the scenario, why referential integrity is important in databases.
-
19N.2.SL.TZ0.3a:
Identify two characteristics that make a database unnormalized.
-
19N.2.SL.TZ0.3b:
Outline why data redundancy may be a problem in the LORRY table.
-
19N.2.SL.TZ0.3c:
Identify the steps to create a query to find the names and telephone numbers of the drivers who drive lorries that have more than 60 cubic metres of trailer space.
-
19N.2.SL.TZ0.3d:
Normalize the database to 3NF. Use the same format as shown, ensuring that primary keys are clearly indicated by underlining them.
-
20N.2.SL.TZ0.1a:
Construct the entity-relationship diagram (ERD) that shows the relationship between the individual, their driving license, and their vehicle(s).
-
20N.2.SL.TZ0.1d:
Outline two issues caused by storing redundant data.
-
20N.2.SL.TZ0.2d:
Explain how the Billetmania database management system ensures that a seat is not booked by two people simultaneously.
-
20N.2.SL.TZ0.3a:
Define the term record.
-
20N.2.SL.TZ0.3b:
Identify the steps to create a query to find the vineyards and names of fruity wines where the quantity in stock is between 25 and 35 bottles.
-
20N.2.SL.TZ0.3c.i:
Identify the steps to create a non-persistent derived field called
TotalPrice
, which would hold the total value of wine stored for each record. -
20N.2.SL.TZ0.3c.ii:
Outline why the inclusion of a derived field will not affect the normalization of a database.
-
20N.2.SL.TZ0.3d:
Construct the 3rd Normal Form (3NF) of the unnormalized Wine file.
-
20N.2.SL.TZ0.3e:
Outline why a single-field primary key is not always an appropriate solution for normalized databases.
A.3 Further aspects of database management
-
18M.2.SL.TZ0.2b:
Outline two methods of database recovery that can be used to restore the system.
-
18M.2.SL.TZ0.2c:
Identify three tasks that are carried out by the database administrator (DBA).
-
18M.2.SL.TZ0.2d:
Customers can choose a credit card as their method of payment. However, some customers are concerned that their personal information could get shared with unauthorized third parties.
Explain one way that the DBA at ShowTime can ensure the anonymity of the customers is maintained.
-
19M.2.SL.TZ0.2c.i:
Describe one strategy that could be used to ensure the data can be recovered if the database becomes corrupted.
-
19M.2.SL.TZ0.2c.ii:
Suggest how the privacy of student data can be ensured.
-
17N.2.SL.TZ0.1e:
Identify four responsibilities of a database administrator.
-
18N.2.SL.TZ0.1c:
A bank holds large volumes of financial and personal information about its clients in its database.
Discuss whether this database should be open to interrogation by the police or the Government. -
18N.2.SL.TZ0.2d:
Identify two tasks that a database administrator carries out to ensure the security of the database.
-
19N.2.SL.TZ0.1b:
Outline one reason why there may be concerns about the amount of personal information that is requested.
-
19N.2.SL.TZ0.1e:
Identify two tasks that are carried out by the database administrator (DBA).
-
20N.2.SL.TZ0.1c:
Explain two reasons why medical information should not be stored in the Person table.
-
20N.2.SL.TZ0.1e:
Outline two situations where data stored by the Driving Licensing Agency may need to be open to interrogation by other parties.
-
20N.2.SL.TZ0.2b:
Outline how the Billetmania information system would utilize a database.
A.4 Further database models and database analysis
-
18M.2.HL.TZ0.4a:
Describe how deviation detection can be used to analyse this data.
-
18M.2.HL.TZ0.4b:
Outline why data warehouses tend to use unnormalized data sets.
-
18M.2.HL.TZ0.4c:
Identify three precautions to be taken before extraction is carried out on the database.
-
18M.2.HL.TZ0.4d:
Outline why data warehousing is time dependent.
-
18M.2.HL.TZ0.4e:
Explain why Basking Coats could use association analysis to improve the marketing of its products.
-
18M.2.HL.TZ0.4f:
Basking Coats has decided to use an object-oriented database rather than a relational database to store its data.
Explain why Basking Coats would use an object-oriented database rather than a relational database to store its data.
-
18M.2.HL.TZ0.9a:
Explain how cluster analysis can be used to achieve the aims of the system that is described above.
-
19M.2.HL.TZ0.4a.i:
Outline why data warehousing is time dependent.
-
19M.2.HL.TZ0.4a.ii:
Outline one reason why ZCC uses a data warehouse.
-
19M.2.HL.TZ0.4b:
Outline why transformation of the data is necessary prior to it being loaded into the data warehouse.
-
19M.2.HL.TZ0.4c:
Compare cluster analysis and classification as techniques for discovering patterns in ZCC's data.
-
19M.2.HL.TZ0.4d:
Describe how the process of deviation detection can be applied to identify customers who are likely to miss the payment deadline for their purchases from ZCC.
-
19M.2.HL.TZ0.4e:
ZCC is aware that other data mining and detection techniques will allow more informed marketing decisions to be made.
Explain how database segmentation and link analysis can be used by ZCC to improve their marketing strategies.
-
17N.2.HL.TZ0.4a:
Evaluate the use of an object-oriented database as opposed to a relational database.
-
17N.2.HL.TZ0.4b:
Define a spatial database.
- 17N.2.HL.TZ0.4c.i: State what is meant by database segmentation.
-
17N.2.HL.TZ0.4c.ii:
Explain one benefit of database segmentation to the telecommunication company.
-
17N.2.HL.TZ0.4d:
Explain how ETL processes could be used in data preparation.
-
17N.2.HL.TZ0.4e:
Distinguish between the use of association and sequential patterns as data mining techniques.
-
17N.2.HL.TZ0.4f:
Describe how deviation detection could be used to detect fraud at the telecommunications company.
-
17N.2.HL.TZ0.4g:
Customers who decide to leave the telecommunication company for a competitor may result in huge losses for the telecommunications company.
Explain with the use of an example, how predictive modelling could be used to optimize information sent to existing customers.
-
18N.2.HL.TZ0.4a:
Identify four sources of information that could be incorporated in the data warehouse.
-
18N.2.HL.TZ0.4b:
Outline two differences between a data warehouse and database.
-
18N.2.HL.TZ0.4c:
Explain how the Extract, Transform, Load (ETL) processes can be used to address the problems related to data migration.
-
18N.2.HL.TZ0.4d:
Outline one ethical problem that may result from data mining.
-
18N.2.HL.TZ0.4e:
Explain how cluster analysis can be used to improve the advertising strategy of the tourism companies.
-
18N.2.HL.TZ0.4f:
Explain the importance of link analysis in exploring patterns in data mining.
-
19N.2.HL.TZ0.4a:
Explain two advantages of using a relational database rather than an object-oriented database.
-
19N.2.HL.TZ0.4b:
State two characteristics of a data warehouse.
-
19N.2.HL.TZ0.4c:
Outline why data needs to be transformed before it can be loaded into the data warehouse.
-
19N.2.HL.TZ0.4d:
Outline why opinion poll data and other election data are timestamped when added to the data warehouse.
-
19N.2.HL.TZ0.4e:
Outline why analytics companies use link analysis.
-
19N.2.HL.TZ0.4f:
Outline why analytics companies use deviation detection.
-
19N.2.HL.TZ0.4g:
Once data has been loaded into a data warehouse it can be mined. The use of data analytics is believed to have been important to the outcome of the US election campaign.
Discuss whether the advantages of data mining techniques in this scenario outweigh the disadvantages.