0% found this document useful (0 votes)
2 views

ValidationEx_Q

The document contains a series of questions and scenarios related to data organization, validation, and control in databases. It covers various types of errors, validity checks, functions of a Database Management System (DBMS), and methods for data verification. Additionally, it includes practical exercises for identifying errors, suggesting validation types, and discussing database field structures.

Uploaded by

sheklunggor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

ValidationEx_Q

The document contains a series of questions and scenarios related to data organization, validation, and control in databases. It covers various types of errors, validity checks, functions of a Database Management System (DBMS), and methods for data verification. Additionally, it includes practical exercises for identifying errors, suggesting validation types, and discussing database field structures.

Uploaded by

sheklunggor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

S.

4 ICT Chapter 2 Data Organization and Data Control

1. John is asked to enter the name of a customer, Molly, into a database. However, he
accidentally entered ‘M0lly’ instead. Which of the following types of errors has he made?

A. Data source error B. Transcription error C. Transposition error D. Parity error

2. Which of the following is a transposition error?

A. 9234o987 B. hil1 C. mary D. hapyp

3. Only numbers between 0 and 99 are allowed to be entered into a field. Which of the following
validity checks should be enforced?

A. Field length check B. Format check C. Check digit D. Range check

4. After a data validation rule has been applied, a field can only be entered with English letters.
Which of the following validity checks has been implemented?

A. Type check B. Range check C. Field length check D. Format check

5. After a data validation rule has been applied, a field can only be entered with ‘M’ or ‘F’. Which
of the following validity checks has been implemented?

A. Field length check B. Fixed value check C. Range check D. Format check

6. Which of the following measures is/are related to data verification?


(1) Check digit (2) Inputting data twice (3) Double data entry

A. (1) only B. (2) only C. (1) and (3) only D. (2) and (3) only

7. A check digit, ‘1’, is appended to the end of the binary number ‘10011010’. Which of the
following types of check digit is used?

A. Odd parity check B. Even parity check C. Modulo-7 D. Modulo-11

8. Which of the following shows the descending order of data hierarchy of a database?

A. Field > table > database > record B. Table > database > field > record
C. Database > table > record > field D. Record > field > table > database

9. Which of the following is/are function(s) of a DBMS?


(1) Managing database structures
(2) Storing and organizing data in a database
(3) Verifying whether data is entered correctly

A. (1) only B. (3) only C. (1) and (2) only D. (1), (2) and (3)

10. Which of the following statements about data indexing is/are correct?
(1) An index can speed up data access.
(2) A table can have more than one index.
(3) An index file does not need to be updated when the data in the related table is modified.

A. (1) only B. (3) only C. (1) and (2) only D. (1), (2) and (3)
C.2/P.1
11. Which of the following is/are the function(s) of a DBMS?
(1) Data filtering (2) Data indexing (3) Data sorting

A. (1) only B. (3) only C. (1) and (2) only D. (1), (2) and (3)

12. Which of the following statements about query forms is/are correct?
(1) They can be stored and are reusable.
(2) They can show data from one table only.
(3) They can print results in specified formats.

A. (1) only B. (3) only C. (1) and (2) only D. (1), (2) and (3)

13. Which of the following mappings concerning data hierarchy is not correct?
Level Example
A. Field Name
B. Table Teacher remarks for students
C. Database All student information in a school
D. Record The information of a student

14. Which of the following devices operates in sequential access mode?

A. DVD B. Data tape C. Floppy disk D. USB flash drive

15. Which of the following statements about data access is/are correct?
(1) Hard disks operate in direct access mode.
(2) Sequential access mode is not used in storage devices any more due to its inferior
performance.
(3) Not all the devices operating in direct access mode store data in hard disks.

A. (1) only B. (3) only C. (1) and (3) only D. (1), (2) and (3)

16. Which of the following is not a method of collecting data?

A. Questionnaire B. Experiment C. Observation D. Verification

17. A computer operator enters a date as ‘11/1/1989’ instead of ‘1/11/1989’ in ‘day/month/year’


format. He can use _____________ to detect the error.

A. check digit B. length check C. data verification D. field presence check

18. A computer operator enters a date as ‘1/13/1989’ instead of ‘1/11/1989’ in ‘day/month/year’


format. He can use _____________ to detect the error.

A. range check B. check digit C. length check D. field presence check

19. A computer operator enters a telephone number as ‘22i7O456’ instead of ‘22170456’. He can
use _____________ to detect the error.

A. range check B. check digit C. length check D. type check

20. A computer operator enters a telephone number as ‘2217333’ instead of ‘22173333’. He can
use _____________ to detect the error.

A. range check B. check digit C. length check D. type check


C.2/P.2
21. Which of the following uses check digit as validity check?
(1) Hong Kong identity card number
(2) ISBN
(3) IP address

A. (1) only B. (3) only C. (1) and (2) only D. (1), (2) and (3)

22. Which of the following methods can be used for data verification?
(1) Enter the data twice by the same person.
(2) Enter the same source data by two persons individually.
(3) Verify the data by check digit.

A. (1) only B. (3) only C. (1) and (2) only D. (1), (2) and (3)

Questions:
1. Identify the errors and state the types of relevant data validation for each of the following.
(a) Name: Ho San N7n
_____________________________________________________________________________
_____________________________________________________________________________
(b) Age: -13
_____________________________________________________________________________
_____________________________________________________________________________
(c) Date of birth: 25/16/2003
_____________________________________________________________________________
_____________________________________________________________________________

2. Suggest the most suitable type of data validation for each of the following:
Suitable type of data validation
(a) Height
(b) Test mark
(c) Temperature
(d) Sex
(e) ISBN
(f) E-mail address

3. A bookstore uses the ‘Customer’ table to store the information of its customers.
Field name Field type Description
firstName Text First name of the customer
lastName Text Last name of the customer
sex Text Sex of the customer, M or F
phone (i) Contact phone number of the customer
dob (ii) Date of birth of the customer
bookAmt (iii) Number of books that the customer has bought
‘Customer’ table

(a) Fill in the missing field types (i) to (iii).


_____________________________________________________________________________
_____________________________________________________________________________
C.2/P.3
(b) It is advised to validate the data during data entry. Suggest one validity check for the fields
‘phone’, ‘sex’ and ‘bookAmt’ respectively.
_____________________________________________________________________________
_____________________________________________________________________________
(c) Someone suggests that the field length of either ‘firstName’ or ‘lastName’ field should be 30.
Give one advantage and one disadvantage of this suggestion.
_____________________________________________________________________________
_____________________________________________________________________________
(d) Which field will you add to be the key field? State one reason.
_____________________________________________________________________________
_____________________________________________________________________________
(e) What is the problem of including the field ‘bookAmt’ in the ‘Customer’ table? Explain briefly
why it is undesirable for the database administrator.
_____________________________________________________________________________
_____________________________________________________________________________

4. A student union of a secondary school wants to use a computer to keep track of its members.
The records of the membership file are processed in the following sequence: Students’ HKID
Card Numbers are not recorded.
(1) The membership fee is $100 annually for Form 1 to Form 5 members, that of Form 6 is
$150 annually, and members of Form 7 are free of charge.
(2) If a member is suspended or left, his (her) record will be reserved until the end of academic
year and then, it will be purged.
(i) Name FOUR fields which must be present in the record.
_____________________________________________________________________________
_____________________________________________________________________________
(4 marks)
(ii) Briefly describe how to validate for any one of the fields.
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
(2 marks)
(iii) Briefly describe how to verify for one other field.
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
(2 marks)
(iv) Give ONE type of error in the data input stage which may NOT be detected by validation
checks.
_____________________________________________________________________________
_____________________________________________________________________________
(2 marks)
C.2/P.4

You might also like