Computer Science Paper 2 HL
Computer Science Paper 2 HL
Option A — Databases
1. Marble Reading Book Stores (MRBS) is a chain of bookstores based in London. The
stores want to keep information about the books they sell, the authors of the books and the
publishers they work with. The assumptions made when the database was created were:
• a publisher can publish books from one or more authors
• an author can write one or more books.
(a) Construct the entity-relationship diagram (ERD) for this scenario. [2]
PUBLISHER
Publisher_Name City Country Telephone
AUTHOR
Author_Num Author_Name1 Author_Name2 DOB Publisher_Name
BOOK
ISBN Book_Title Genre Author_Num Year_Pub
(b) Outline why data validation is difficult for the Book_Title attribute. [2]
SELECT Book_Title
FROM BOOK
WHERE Genre = "Non-fiction"
AND ISBN = '0-98124-612-2'
(d) Construct a query to find the titles of the books published by “Orlando Crux”. [4]
(f) Outline how data consistency can be maintained in transactions in this database
system.[2]
(a) Explain how concurrent use of the school database is possible in this situation. [3]
(b) Describe two ways that data security in the school's database can be maintained. [4]
A DBA is required to carry out tasks such as ensuring there is a strategy to recover the
database if it becomes corrupted and that the data is shared ethically.
(c) (i) Describe one strategy that could be used to ensure the data can be recovered if
the database becomes corrupted. [2]
(ii) Suggest how the privacy of student data can be ensured. [3]
Turn over
–4– M19/4/COMSC/HP2/ENG/TZ0/XX
(Option A continued)
3. Armour Hardware Company has the following data about salespersons and the quantities of
items sold.
SALES_PERSON
Product_ Unit_ Product_ Date_And_ Sales_ Sales_ Manager_ Manager_
Number Price Name Time Person_ Person_ Number Name
Number Name
(b) Outline why the SALES_PERSON table is not in 1st Normal Form (1NF). [2]
(c) Construct the 3rd Normal Form (3NF) of the unnormalized relation shown above. [8]
(d) Outline why it is necessary to ensure that referential integrity is maintained in databases. [2]
(e) Outline why a primary key may consist of more than one attribute. [2]
(Option A continued)
4. ZCC has a chain of offices that sell different types of paper to customers all over the world.
They have data stored in their data warehouses that will help them make important marketing
decisions for the future, as they have plans to diversify into other products like gift-wrappers,
scribble-pads, stationery, books and calculators.
(ii) Outline one reason why ZCC uses a data warehouse. [2]
(b) Outline why transformation of the data is necessary prior to it being loaded into the
data warehouse. [2]
ZCC is going to use data mining techniques to discover patterns in their data.
(c) Compare cluster analysis and classification as techniques for discovering patterns in
ZCC's data. [6]
The company has customers who have missed the payment deadline for their purchases
from ZCC.
(d) Describe how the process of deviation detection can be applied to identify customers
who are likely to miss the payment deadline for their purchases from ZCC.[3]
ZCC is aware that other data mining and detection techniques will allow more informed
marketing decisions to be made.
(e) Explain how database segmentation and link analysis can be used by ZCC to improve
their marketing strategies. [5]
End of Option A
Turn over