Page 1056 - SUBSEC October 2017_Neat
P. 1056
- 5 -
DO NOT WRITE IN THIS AREA
(d) Describe two measures that can be used to prevent against software attacks on Elaine’s
website.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(2 marks)
(e) Users’ data are stored in an online database. Apart from first and last name, list two fields
that should be used to capture data on users who register for Elaine’s recipes.
.............................................................................................................................................
DO NOT WRITE IN THIS AREA
.............................................................................................................................................
.............................................................................................................................................
(2 marks)
(f) Elaine wants to extract some information from the database. Complete the table by
selecting the most suitable database feature from the list below.
Calculated Form Query Report Sort
Field
Task Database Feature
The list of users who have accessed her
cupcake recipe
DO NOT WRITE IN THIS AREA
How many users have registered
An overview of the number of users who
requested each recipe
A list of the users by country but in
ascending order
(4 marks)
GO ON TO THE NEXT PAGE
01229020 SPEC/2017
‘‘*’’Barcode Area”*”
Sequential Bar Code