Professional Documents
Culture Documents
Let’s Think
- Similarity: Data records are stored in the smart card and the Hong Kong ID card.
- Difference: e-Channel system requires users’ fingerprints for identification while school smart card
system does not.
1
- Parity bit is for error detecting but not for error correcting as there is no way to determine which
particular bit is corrupted.
The whole piece of data must be re-transmitted.
One example of error-detecting code is Hamming code. ( wikipedia)
Activity 1
2. The web site does not allow to access the next page and requires the user to fill up all required blanks in
the registration form.
3. Input stage
4. (a) Data validation and data verification
(b) Input data twice is used to avoid users introducing errors when inputting the password.
5. It uses fixed value check (choice control) to ensure that the data conforms to one of the predefined values
(male) or female)
6. (a) It is used to prevent automated registration.
(b) It can prevent somebody from getting a lot of e-mail accounts by using a computer program.
2
Activity 2
Field name Field length Field type
english_name 30 text
chinese_name 12 text
age 3 numeric
login_id 12 text
password 12 text
- the field type of the fields ‘login_id’ and ‘password’ should be text so that they can have more
combinations.
- The field length of the field ‘password’ should be longer so that the password can be more secure.
- Field length of the field ‘english_name’ may be too short.
- Field length of the field ‘chinese_name’ may be too long. (e.g. 司徒歐陽慧玲)
3
(c) Paul finds that the speed of accessing data on a hard disk drive has become very slow. Suppose that the
computer is not infected with virus. State one reason for the problem.
The disk has become fragmented.
Concept Map
1. F
2. E
3. A
4. H
5. G
6. D
7. C
8. B
Concept Checker
1. F (Validation)
2. F (Double data entry)
3. F (Four different levels)
4. F (For hiding unmatched records, but not for sorting orders.)
5. F (one or more tables)
4
Short Questions
1. (a) Data source error, transcription error and transposition error (1 x 3)
(b) (i) Transposition error (1), transcription error (1)
(ii) Transposition error: 51 15 (1), transcription error: i I (1)
2. (a) 4 (1)
(b) (i) Number / integer (any 1 x 1)
(ii) 100,000 – ranging from 0 to 99,999 (2)
(c) The field length of ‘Name’ is too short /
The field ‘Name’ cannot record both Chinese names and English names. (any 1 x 1)
3. (a) (1 for the correct ‘Sex’ field, 1 for the correct ‘Mark’ field)
Name Sex Mark
Lancy Ng F 72
Lulu Lo F 82
Billy Chau M 60
Peter Wu M 93
Robert Wong M 46
(b) Fixed value check (1)
(c) No, (1) because any one field or any combination of the fields cannot guarantee unique field value for
the identification of the record. (1)
4. (a) Parity check is used for validation of binary digital data. (1)
An additional parity bit is attached to the end of each word of data.
There are two types of parity check: odd parity check and even parity check. (1)
(b) (i) 1100 0100 (1)
(ii) 0011 0011 1001 (1)
5
Long Questions
1. (a) A key field is a field that can be used to uniquely identify a record from the other records. (1) The
data in a key field is unique to a specific record. (1)
(b) It is because it involves sensitive personal information. (1)
It is not appropriate to disclose publicly. (1)
(c) ‘Customer_ID’ (1) Because it can uniquely identify the customers. (1)
Also, it does not involve the personal information of the customers and hence it can be disclosed
publicly. (1)
(d) The table is sorted by the field ‘Sex’ (1) in descending order (1) and then by the field ‘Name’ (1) in
ascending order. (1)
2. (a) Microsoft Access, Microsoft Visual FoxPro and FileMaker Pro (each one x 1)
(b) (i) Data entry form (1)
(ii) - Provide a user-friendly environment for data entry.
- Perform data validation such as range check and type check of test marks.
- Perform data verification such as input data twice of renewal password.
- Perform data entry with features e.g. pull down menu and check box.
(any 3 x 1)
(c) Avoid data loss due to system failure or machine failure. (1)
(d) Advantage: lower running cost / larger storage capacity (any one x 1)
Disadvantage: slower / less reliable (any one x 1)
(e) (i) - Use compression program to compress data files before storing into the magnetic tape.
- Back up only recently updated files into the tape. (any one x 1)
(ii) Use another hard disk to clone the data in the source computer. (1)