1. Theory Fundamentals
A section of Computer Science, 9608
Listing 10 of 304 questions
A veterinary surgery cares for sick animals. The surgery has a file-based database that stores data about the pets, their owners, and appointments made with the surgery. The surgery wants to upgrade to a relational database. Explain the reasons why the surgery should upgrade their database. The design for the surgery database, SURGERY, is: PET(PetID, OwnerFirstName, OwnerLastName, PetName, PetBreed, PetDateOfBirth, TelephoneNumber) APPOINTMENT(AppointmentID, Date, Time, StaffID, PetID) Give one reason why the database design for SURGERY is not in Third Normal Form (3NF). The database needs to be normalised to 3NF. A pet may have more than one owner and an owner may have more than one pet. The appointment table does not need to change and has been repeated below. Give the name and attributes of three additional tables in 3NF. Identify the primary keyin each table. APPOINTMENT(AppointmentID, Date, Time, StaffID, PetID) Table 1 Table 2 Table 3 Part of the table APPOINTMENT is shown. The veterinary surgery uses Data Manipulation Language (DML) statements to search for appointments. AppointmentID Date Time StaffID PetID 02/02/2021 12:40 JK1 20CF 02/02/2021 12:40 PP2 10DT 02/02/2021 12:50 JK1 9RR 02/02/2021 13:00 JK1 7MR Identify the industry standard language that provides both DML and Data Definition Language (DDL) statements. Write a DDL statement to update the table APPOINTMENT and define AppointmentID as the primary key. Complete the DML script to display the times and Pet IDs of all appointments on 02/02/2021 with staff ID of ‘JK1’, in descending order of time. SELECT , FROM APPOINTMENT WHERE AND ORDER BY Time ; New pet owners complete a paper-based form to register their pets at the surgery. Describe two verification checks that can be carried out when the data from the paper- based form is entered into the database. Appointments can be booked between 09:00 and 16:50 on Monday to Friday. Describe the ways in which the appointment date and time can be validated to make sure they are reasonable. The surgery has five computers that can all access the database. A copy of the database is stored centrally. Complete the description of this type of network model by filling in the missing terms. The model has one that stores all the data for the surgery. The other computers are . When a user requests data, a request is sent to the . The surgery wants to keep all data secure. The surgery network is not connected to the Internet. Identify two authentication techniques the surgery could use to restrict access to the data.
9608_w20_qp_11
THEORY
2020
Paper 1, Variant 1
Questions Discovered
304