You are on page 1of 5

Topic: Database/Validation

Name:..Class/Sec
1. A worker at a company has to go through a logon procedure to gain access to her computer
system.
(a) The first thing she has to do is type in a user name and a password.
Why is this done?
[1]
(b) The password is typed in twice.
Why is this done?
[1]
A menu then appears on her screen. She chooses to connect to the Internet.
(c) Describe two ways her computer system is protected against loss or corruption of files once
the computer system is connected to the Internet.
1..
2[2]
(d) The worker leaves her computer system for a 10-minute break.
(i) From a health and safety aspect, why does she need to take a regular break?
.
(ii) Apart from switching off her machine, how could she ensure her computer system was secure
whilst taking her regular break?

..[2]
2. A media sales company has set up a website. The opening page is:

(a) (i) What TYPE of menu is being used for the film category?
(ii) Give ONE advantage of this type of menu.
[2]
(b) (i) Name a validation check that could be used on the Customer ID field?
[1]

(ii) Describe TWO types of test data, together with examples, that could be used to see whether
the validation check named in (i) works.
Type 1.
Example.
Type 2
Example[4]
3. Describe, with examples, two types of test data which could be used to test a
system.

1..

2.
[4]
4. Name and describe three validation checks which could be carried out on a 16-digit credit
card number when it is typed into a computer.
Name..
Description
Name.
Description..
Name
Description..[6]
5. A hospital holds records of its patients in a database. Four of the fields are:
date of visit (dd/mm/yyyy)
patients height (m)
8-digit patient ID
contact telephone number
The presence check is one possible type of validation check on the data. For each
field, give
another validation check that can be performed. Give an example of data which
would fail your
named validation check.
A different validation check needs to be given for each field.
[8]
field name

date of visit
patients height

name of validation check

example of data which


would
fail the validation check

patient ID
contact

6. A shop uses an information screen linked to a computer to allow customers to order goods
directly.
The first screen shows three options:

(a) What is the best input device to allow customers to choose one of the three options?
[1]
(b) The customer is then sent to another screen where they have to input:
the goods reference number which is 8 digits long
todays date which must be in the form dd/mm/yyyy
the customers telephone number
For each input give one validation check that should be performed.
A different type of check must be given in each case.
goods reference number.
todays date
telephone number .[3]
7. (a) Which validation methods are being carried out by the following three pseudocode
statements?
(i) if age > 10 and age < 20 then print "correct"
.[1]
(ii) if gender = "male" and title = "Mr" then print "correct"
.[1]
(iii) if field = "" then print "input data is missing"
.[1]
(b) Name a different validation technique and give an example to show how it works.
Name
Example[2]

8. Gita has employed Johann, a systems analyst, to create a new database system
for her car sales business. She only sells cars made by Rock and only the models
Feisty, Mendo and
Galactica in red, blue or gold. Most of the cars have air conditioning but some do
not. She
sells 3, 4 and 5 door cars.
(a) Give a reason why would it not be sensible to have a Make field in the database.
.
[1]
(b) Complete the design table below giving the field names which would be used in
the
database and describing the most appropriate validation check which could be
carried
out on each field.

(c) Discuss verification and validation.

[6]
9. Describe two methods of verification and explain why verification is needed.

..[4]

10. Here is part of a database of students born between 1st January 1999 and 31st December
1999.
It shows the number of IGCSEs each student is taking next year.
No student is allowed to take more than 10 IGCSEs.
Each student has a seven digit Student number.
Some of the data has been entered incorrectly.

(a) Paul Nixon has an incorrect Student number. For each of the following fields write down the
Name of the students whose data has been entered incorrectly.
(i) Year of birth
(ii) Gender (iii) Number of IGCSEs
(b) The school secretaries who typed in the original data, verified the data to make sure they
typed it in correctly.
Identify two methods of verification.
1
2
(c) For each field, name a different validation check which would have prevented the errors in
the
following fields.
(i) Year_of_birth ....................................................................................................................
(ii) Number_of_IGCSEs .........................................................................................................
(iii) Student_number ...............................................................................................................
[3]