For internal use of KMB students only
Strand 3: IT systems
Introduction
Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions. Databases enable organizations to maintain accurate and comprehensive records. In order to appreciate the role that databases play, the ITGS student must have an understanding of how they work, which can only be gained from the design and creation of basic relational databases as well as by examining how databases are used in specified scenarios (for instance, schools, retail stores, online shopping, online reservations).
The increasing use of databases raises a range of social impacts and ethical issues such as the rights of individuals with respect to the storage and potential sale of their personal data or the ease of data mining and data matching. Students are expected to discuss these issues and, where appropriate, evaluate possible solutions.
Possible scenario
A vet requires information about pet owners and their pets. The ITGS student must be able to develop an original IT solution to meet the vet’s needs. This knowledge should be acquired through a practical activity where the student creates a (minimum) three-table relational database (first normal form only) that uses queries to interrogate the data, forms to enable the easy input and viewing of data, and reports to provide printed information as required.
IT concepts to address in this topic
Database organization
Table
Field, data types, key field/primary key, secondary key
Record
Flat-file database, relational database, normalization
Database management system
Specialized databases: for example, web databases, online encyclopedias
Functions
Data validation: data types, range check, check digit, field size, input mask, drop-down list
Queries: for example, searching, sorting, filtering, use of Boolean operators (AND, NOT, OR)
Data entry form
Report generation
Macros
Transfer of data between databases and other applications
Data storage and access
Data integrity, reliability, redundancy
Data matching, data mining
Database security
Practical database techniques
Table
Field, data types, key field/primary key, secondary key
Record
Linking tables to create a relational database
Data maintenance: changing, editing, deleting records
Queries: for example, searching, sorting, filtering, use of Boolean operators (AND, NOT, OR)
Data entry form
Report generation
Creating and editing simple macros
Mail merge
ASSESSMENT PRACTICE
Assessment objective 1: Knowledge and Understanding
Identify two fields that could be in the Employee table of the database.
First name
Surname
ID number
Gender / sex
Phone number
Date of birth
Manager’s name
Position
Department e-mail.
Award [1] for identifying each appropriate field up to maximum of [2].
Identify two characteristics of a relational database.
more than one linked table/entity
primary key fields linked to foreign key fields
each record is unique
eliminates data redundancy
is a smaller file than a flatfile database.
Award [1] for identifying each characteristic of a relational database up to maximum of [2].
Identify two methods that could be used to ensure that the data input to the database is accurate.
validation
verification.
Award [1] for identifying each method that can be used to ensure the data added into the database is accurate up to maximum of [2].
Assessment objective 2: Application and analysis
As part of the implementation of the biometric authorization system, Bright Creativa has written a privacy policy.
Explain three features that Bright Creativa would need to include in a privacy policy linked to the company’s biometric authorization system.
The privacy policy will need to be easily understood/transparent.
So employees are able to understand how their data will be collected, stored or who it may be shared with.
The privacy policy must explain what data is being collected about them.
And this data is intended to be used by the company.
The privacy policy will need to explain that data will only be stored for as long as necessary / for the length of time the employee is with the company.
And that appropriate measures have been taken to safeguard it from unauthorized access.
If a data breach occurs, i.e. the data is compromised or stolen.
The company must inform the users immediately.
Award [1] for identifying a feature that Bright Creativa would need to include in a privacy policy and [1] for explaining why that feature should be included up to a maximum of [2].
Mark as [2] + [2] + [2].
Assessment objective 3: Synthesis and evaluation
To what extent is the employees’ improved access to company resources outweighed by their concerns about the level of surveillance by the company?
Advantages to the employee
convenience, such as there is no need to carry ID cards to unlock doors
there is no need to remember passwords to logon to the network, or tocontinuously change the password
is likely to be more secure than relying on authentication techniques such asa username and password as it is harder to forge a fingerprint thanremember a password
may provide quicker access to resources
they don’t need to carry cash to buy items from the café.
Concerns of the employee may
their performance could be monitored and performance ratings based on potentially information provided by the system
monitoring may become covert surveillance which may be unethical, especially if the employees are not aware of the ways in which the information is used
purchases are tracked and judgements might be made about them, for example, what foods they purchase
the fingerprints may not always be reliable, for example if the employee cuts the finger that is used for biometric authentication, which means that are source may not be accessible
logging on to each resource using biometric identification may be time consuming and lead to inefficient working practices.