Professional Documents
Culture Documents
ICT Focus
Similarity: Data records are stored in the smart card and the Hong Kong ID card.
Difference: e-Channel system requires users’ fingerprints for identification while
school smart card system does not.
1
as telephone number.
Activity 1
2
2. The web site does not allow to access the next page and requires the user to fill
up all required blanks in the registration form.
3. Input stage
4. (a) Data validation and data verification
(b) Input data twice is used to avoid users introducing errors when inputting the
password.
5. It uses fixed value check to ensure that the data conforms to one of the
predefined values (male or female).
6. (a) It is used to prevent automated registration.
(b) It can prevent somebody from getting a lot of e-mail accounts by using a
computer program.
Activity 2
Field name Field length Field type
english_name 20 text
chinese_name 20 text
age 3 numeric
login_id 12 text
password 12 text
• The field type of the fields ‘login_id’ and ‘password’should be text so that they can
have more combinations.
• The field length of the field ‘password’ should be longer so that the password can
be more secure.
- Field length of the field ‘english_name’ may be too short.
- Field length of the field ‘chinese_name’ may be too long. (e.g. 司徒歐陽慧玲)
3
(c) List six types of database objects used in Microsoft Access.
Table, form, report, query, macro and module
Concept Map
1. F
2. E
3. A
4. H
5. G
6. D
7. C
8. B
Concept Checker
1. F
4
2. F
3. F
4. F
5. F
Short Questions
1. (a) Data source error, transcription error and transposition error (each one × 1)
(b) (i) Transposition error (1), transcription error (1)
(ii) Transposition error: 51 → 15 (1)
Transcription error: i → I (1)
2. (a) 4 (1)
(b) (i) Number (or integer) (1)
(ii) 100,000 (ranging from 0 to 99,999) (2)
(c) • The field length of ‘Name’ is too short.
• The field ‘Name’ cannot record both Chinese names and English names.
(any one × 1)
3. (a)
Name Sex Mark
Lancy Ng F 72
Lulu Lo F 82
Billy Chau M 60
Peter Wu M 93
Robert Wong M 46
(1 for the correct ‘Sex’ field, 1 for the correct ‘Mark’ field)
(b) Fixed value check (1)
5
(c) No, (1) because any one field or any combination of the fields cannot
guarantee unique field value for the identification of the record. (1)
4. (a) Parity check is used for validation of binary digital data. (1) An additional
parity bit is attached to the end of each word of data. There are two types of
parity check: odd parity check and even parity check. (1)
(b) (i) 1100 010 0 (1)
(ii) 0011 0011 100 1 (1)
Long Questions
1. (a) A key field is a fi eld that can be used to uniquely identify a record from the
other records. (1) The data in a key fi eld is unique to a specific record. (1)
(b) It is because it involves sensitive personal information. (1) It is not
appropriate to disclose publicly. (1)
(c) ‘Customer_ID’ (1) because it can uniquely identify the customers. (1)
Also, it does not involve the personal information of the customers and
hence it can be disclosed publicly. (1)
(d) The table is sorted by the field ‘Sex’ (1) in descending order (1) and then by
the field ‘Name’ (1) in ascending order. (1)
2. (a) Microsoft Access, Microsoft Visual FoxPro and FileMaker Pro (each one ×
1)
(b) (i) Data entry form (1)
(ii) • Provide a user-friendly environment for data entry.
• Perform data validation such as range check and type check of test
marks.
• Perform data verifi cation such as input data twice of renewal
password.
• Simplify data entry with features e.g. pull down menu and check
box.
(any three × 1)
(c) Avoid data loss due to system failure or machine failure. (1)
(d) Advantage: lower running cost / larger storage capacity (any one × 1)
Disadvantage: slower / less reliable (any one × 1)
(e) (i) • Use compression program to compress data files before storing into
the magnetic tape.
• Back up only recently updated fi les into the tape.
(any one × 1)
6
(ii) Use another hard disk to clone the data in the source computer. (1)