Data Processing Paper 2, May/June 2015

Question 2

  1. Define the following
  2. (i)Database (ii)Database Management System
  3. Mention three functions of a database management system
  4. Mention two ways through which data can be destroyed
  5. State three precautionary measures to prevent data loss.

 

Observation

The expected answers were:
(a)

    1. Database is an organized, collection of related data.

OR
A set of data organized in a structured manner
OR
An organized, collection of similar/related data/information for easy search and retrieval

    2. Database management system is a set of programs that enables the user to store, modify and extract information from a database.

OR
A software that manages the database.
Program that provides users with the tools to add, delete, access, modify and analyse stored data in one location.
OR
Software to create, manipulate control and retrieve data stored in database 

      (b) Functions of a database management system are:

  1. Redundancy control/Minimizes Data Repetition
  2. Easy access and retrieval of data
  3. Provision for backup and recovery
  4. Maintenance of data integrity
  5. Create database
  6. User access control/security/protection of data
  7. Data manipulation 
  8. Data Storage Management
  9. Concurrence/ Multi user Access control
  10. Data transformation/ modification/editing
  11. Provision of Data Access Language and Application programming interface
  12. Transaction Management
  13. Data Dictionary Management
  14. Provides Database Communication interface
  15. Report generation/presentation/output/formatting


(c) 

  1. Overwriting an existing file
  2. Hardware failure
  3. Virus attack/Spyware/Malware/Malicious Software
  4. Fire outbreak
  5. Power failure
  6. Software malfunction
  7. Accidental/mistaken/unintentional deletion by user/Human error
  8. Intentional deletion by user
  9. Natural disaster
  10. Exposure to Magnetic field
  11. Physical/Mechanical damages to hard drive
  12. Theft of Computer

                                                                                           (d) 

  1. Power backup
  2. Data backup/safe data
  3. Proper shut down of computer
  4. Use of anti-virus software and network firewalls/anti-spyware/anti-malware
  5. Regular defragmentation
  6. Encryption
  7. User education                       
  8. Avoid physical/mechanical contact    
  9. Alert/warning before deletion
  10. Labelling of storage devices
  11. Avoid water/liquid spillage
  12. Physical access control/restriction to computer
  13. Access control mechanism/PIN/Password
  14. Keep storage devices from magnetic substances/objects
  15. Avoid removing storage devices while in use
  16. Avoid movement of desktop computers while in operation/use
Candidates demonstrated good knowledge of database and safety of data in their responses.