Last changed: March 9, 2022 11:35 AM
VCE Applied Computing Notes by Mark Kelly
Software DevelopmentVCAA Exam Post Mortem2016Now in living colour! |
Post Mortem Notes This is not a VCAA publication.
I do not speak for the VCAA, the IT examiners, or exam markers. I was not involved in the writing or marking of this examination. Extracts from exams are all Copyright © VCAA, and are used with permission. Use these post mortems at your own risk. I reserve the right to change my mind completely, at short notice, about anything I've said here. Suggestions, discussions and corrections are welcome. Questions look like this. |
Other VCE IT Exam Post Mortems to enjoy IPM / ITA / Informatics / Data Analytics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2023
|
The Post Mortem Awards |
|
The infamous SCHMACKOS award for questions that are a complete dog's breakfast. |
The Questions That Make You Sick As A Dog Award |
The Stamp of Approval for questions I like. |
The exciting Illiteracy Award for crimes against the English language. |
New for 2016 - the Naughty Step Award, for when the examiners breaks their own rules! and are sent to think about what they have done. |
Written examinationThursday 10 November 2016 Reading time: 11.45 pm to 12:00 noon (15 minutes) Writing time: 12:00 noon to 2:00 pm (2 hours)
Materials supplied
Instructions
At the end of the examination
Students are NOT permitted to bring mobile phones and/or any other unauthorised electronic devices into the examination room. |
Examiners' report general comments
|
|||||||||||||||||||||||||||||||||||||
SECTION A - Multiple-choice questionsInstructions for Section A Answer all questions in pencil on the answer sheet provided for multiple-choice questions. |
|||||||||||||||||||||||||||||||||||||
A1 | Question 1 Which specific data type would be the most appropriate to represent a street number (for example, ‘5A’)?
Answer is A. The sample data is alphanumeric - containing both alphabetical data and numbers. It can only be stored as text/string. This bit will be filled in when the examiner's report is released - in half a year or so. |
||||||||||||||||||||||||||||||||||||
A2 | Question 2 In the process of sorting an array of eight integers using the quick sort algorithm, the first partitioning with the array appears as follows.
Which one of the following statements is correct?
Answer is B. I'll stake 5 cents on it. I'm hoping... For most students, I suspect this was a brain-destroying question to start off section A. I instinctively started trying to reverse-engineer the starting state of the array, before realising that it was like trying to unscramble an egg. It took a while to go back to first principles: quicksort divides an array into 2 subarrays with a point somewhere in it (the pivot) that separates the values smaller than the pivot value from all values greater than the pivot value. This meant that having to carry out a quick sort was not necessary. It involved more basic principles inherent to quick sort. After a partition, there will be a value (the pivot) that will only have smaller values to its left, and only greater (or equal) values to its right. Taking each datum in turn and applying this rule...
I'm guessing 98% of you just guessed an answer. It took me an hour (and three Youtube tutorials) to finally decide. This is a luxury you do not have in exam conditions. The lesson here (apart from pivot stuff) is that if you get a multichoice question that takes more than a couple of minutes to be sure about - SKIP IT and come back if you have time. Do not spend 15 minutes stubbornly trying to earn one single mark - especially when there's a 25% chance you'll get the mark by sheer luck anyway. Dog almighty, this was a brutal way to start off a nice, friendly exam! It was not unfair or unclear - in fact I tip my hat to its clever questioning and focus on core theoretical principles - but by golly there will be a few sad and confused puppies in the cohort after this question.
I inaugurate a new award - the 'Scare The Bejeezus Out Of Students Award'. |
||||||||||||||||||||||||||||||||||||
Use the following information to answer Questions 3 and 4. The following algorithm has been written. First, let me be the first to say BAD EXAMINER and bop you on the nose with a rolled up magazine. You've broken your own pseudocode conventions! Assignment in SD exams is marked by the symbol, not "=" which is reserved for equality. Then, you forgot to put the output keyword in bold with a capital 'O'. One would expect better. Now, go and sit on the naughty step. No. Don't be a sook. Naughty step. Now! |
|||||||||||||||||||||||||||||||||||||
A3 | Question 3 The algorithm needs to be tested for logic errors.
Answer is B. Another challenging question. Consider the options. None of them leap out as immediately ridiculous, so there are no quick and easy cross-outs to be made. We need to thoroughly check ALL possible valid data inputs. We need to focus on boundary conditions where the logic of the code may fail. These valid inputs are not defined, but we can assume 0 to 100. The 3 valid ranges and their boundaries are (paying close attention to the >= and > signs)
Options A, B and D all test the 3 possible ranges of valid inputs. (A) has more tests and does not focus on boundary values as well as (B). Option (D) also lacks boundary-specific tests. So of the 3 complete sets, B would be the most likely to uncover boundary condition faults in the code's logic. Another thought-provoking question. These multichoice questions are taking some time to ponder!
|
||||||||||||||||||||||||||||||||||||
A4 |
The algorithm contains
Answer is D. It does not have functions. Rule out (A) and (C). It does not contain multiple 'procedures' (B) even thought the code itself would constitute a procedure. That leaves (D) - but check it anyway. It has selection statements ('IF' etc to choose which code to execute) and instructions (like 'output grade')
|
||||||||||||||||||||||||||||||||||||
A5 | Question 5 Which data structure would be best to store the data being collected from the form above?
Answer is C. 4 x 1D arrays would do the job, but they would be rather more difficult to manage. Records allow a collection of fields with different data types (e.g. text, Boolean) in a single unit. The key word in the question is "best".
|
||||||||||||||||||||||||||||||||||||
A6 |
When a student upgrades their operating system to a new version of the operating system, the updating software creates a new folder called ‘OperatingSystem.old’ and copies some of the computer’s files to that folder.
According to the wording of the question, the answer would be B - but the question is badly written and common sense should lead to the answer of A. Hmmm. An archive moves a copy of data into offline storage. It deletes the original data. A backup copies (and keeps) the original data. It is intended to allow recovery of lost data. The question says the old OS files are 'copied' to the new folder. That means the original files remain in place and are not deleted. That is a backup. The question would need to have said "moves some of the computer's files" to qualify as archiving. The problem is, in real operating system upgrades, "old" folders contain OS data that has been copied, then deleted and replaced by newer versions - which is an archive. The question is flawed. If the original files are only copied and the originals are left in place, it's a backup. If the original files are moved and the originals are deleted, it's an archive. The question says that files are copied, not moved. It must be a backup - but that does not happen in The Real World™. Why copy files to a new folder when the originals are left in place? It makes no sense for an operating system upgrade to retain old, incompatible versions of files in its active system software store.
|
||||||||||||||||||||||||||||||||||||
A7 | Question 7 The following array is sorted in ascending order.
What type of algorithm is used to sort the array?
Answer is D. Sorting - again. Well it obviously can't be C, which is a search, not a sort. That leaves 3 little piggies. If it were a bubble sort (B), the first few pairs would have been swapped, leading to 6, 13, 25 - which isn't right. Rule that out too. I'm assuming a good exam would not re-examine quick sort again so quickly, so I consider it wiser to next investigate selection sort rather than binary search as next contender... Work it through a selection sort walkthrough...
Yep. After the third pass, it matches the question. Done and done. See the slideshow on selection sort to see how it works. Another challenging and time-consuming multichoice question. This exam is not easy.
|
||||||||||||||||||||||||||||||||||||
A8 | Question 8 If software is purchased over the internet, copies of that software can be sold provided that
Answer is B. If you thought of 'open source', remember that such a licence lets you use and (maybe) redistribute the software, but not to sell it. |
||||||||||||||||||||||||||||||||||||
Use the following information to answer Questions 9 and 10. |
|||||||||||||||||||||||||||||||||||||
A9 | Question 9 The purpose of the pseudocode is to
Answer is D. Once again, SD exercises the famous ">=" gotcha. Whenever you see <= or >= your shields should be up. Again, VCAA mucks up their pseudocode: this time with with irregular indentation in the 'Display' line. At least they got the assignment arrows right this time. One thing I find concerning is the use of the len( ) function. Pseudocode is supposed to be completely intuitive and readable and self-explanatory. Any invented functions should either be blatantly-obvious or explained in a comment. The len( ) function is an invention that - supposedly - returns the number of elements in the named array. So if nums[ ] had 5 elements, len(nums) would return 5. But that is not immediately and blindingly obvious to students whose programming language did not use that name for the function, or used a different name for it. From my personal experience, len( ) is a function that returns the length of a string. Let's make a deal, VCAA - you may invent any useful function you like for exams, but they must be either crystal clear or self-explanatory in meaning (e.g. 'Display') or explained in a comment, such as... // len( ) returns the number of elements in an array OK?
|
||||||||||||||||||||||||||||||||||||
A10 | Question 10 When converting the pseudocode into a program, it would be useful to include in the programming code the
Answer is B. Probably. There is no internal documentation in the pseudocode so it can't be (C). There is no external documentation either, and even if there were, it wouldn't be put in the code - 'cos it's external. So it's not (D) I can't see how the design specifications (A) would be useful in the source code. That only leaves the constraints of the code, which may be useful to later programmers who need to be aware of the limits within which the code needs to operate. For example // Remember that nums[ ] must support floating point values! The answer had better not be C. Sure, pseudocode is highly recommended in source code, but if there is none given in the pseudocode, how can it be put into the source code? Notice that the question says "it would be useful to include in the programming code the" - not just any design specs, constraints, internal or external doc but those that have already been provided in the pseudocode. If the question turns out to mean, "When converting the pseudocode into a program, it would be useful to include in the programming code some internal documentation." I will be very, VERY annoyed - in both capitals and bold face!
|
||||||||||||||||||||||||||||||||||||
Use the following information to answer Questions 11 and 12. |
|||||||||||||||||||||||||||||||||||||
A11 |
How long will it take the photographer to download one photograph to a computer that has a wireless connection running at 10 megabits per second?
Answer is D. Rejoice, for we have reached the single question for which you brought your calculator. Let's work it through. 2 megabytes = 2,000,000 bytes (or 2,097,152 if you're a pedantic 1,024 bytes to a kilobyte person. The answer does not depend on which one you choose.) Multiply by 8 to get 16,000,000 bits. Divide by 10,000,000 (10 megabits) Answer is 1.6 seconds. I found it odd how the examiners suddenly decided to get casual and abbreviate "seconds" to "s" in the options, without explanation and for no apparent reason. Would this be obvious to ESL students?
|
||||||||||||||||||||||||||||||||||||
A12 |
The photographer is considering using a wired network.
Answer is A. This is a pretty easy one. Cables are nearly always faster than wireless, and - unlike wireless - cannot accidentally carry data beyond the walls of the organisation. Cables are, however, far from portable or easy to set up.
|
||||||||||||||||||||||||||||||||||||
A13 |
A standalone application is being written for handheld devices. This application will store all its data on the device and does not need an internet connection.
Answer is A. I expect there will be arguments over this one, and most kids would have been scratching their heads during the exam. The stem says that an internet connection is not needed, but is some other communications (e.g. wifi or Bluetooth) required? The app is said to be "standalone" which means it needs no connection to remote data or code sources. So let's assume no comms are needed at all. Think of a self-contained game like Solitaire on a phone. So, which architecture would suit?
That leaves A, which fits because the app is meant for handheld devices. |
||||||||||||||||||||||||||||||||||||
A14 |
XML stands for extensible mark-up language.
Answer is B. I reckon. XML is new theory, and many people will not be very familiar with it. The answer will not be (A). XML is used in many places other than web pages: it is a flexible all-purpose, plain-text, human-readable way to store and communicate self-contained, structured data files. I have done a lot a work with XML because the database I made for teachers to create semester reports had to generate XML to feed into the education department's system. It was certainly possible to modify data within an XML file, considering it is plain text. Mind you, XML will break if you muck around with the tags in the file, but not the data within the tags. So (B) is true. And therefore (C) is not true. It is true that XML and HTML both use markup tags to provide structure to data content, but that's where the similarity ends. Otherwise you'd have to say that worms and garden hoses are basically the same because they're both long and thin with a hole in the middle.
|
||||||||||||||||||||||||||||||||||||
A15 |
Inta is writing a new application for a small bicycle company so its staff can use their mobile phones to access the stock information stored on the company’s fileserver. In the company, there is a manager and four people who sell the bicycles. They all use different brands of mobile phones.
Answer is A. Hmmm. Interesting. What key knowledge is this question fishing for? What exactly is being examined? Is it testing understanding of who should be consulted? Or is it testing understanding of how they should be consulted? Or could it be testing both? I'm thinking of SD U3O2 KK 1 in the study design - "techniques for collecting data to determine needs and requirements, including interviews, surveys and observation". The question smells very much like a fishing expedition for knowledge of KK1 - data collection techniques. This is another arguable one. One could say that interviewing all users (A) would be over-the-top and that just one user and the manager (B) would suffice. But there is that rather odd comment in the case study - "They all use different brands of mobile phones." "Why is that there?" you should ask, for stuff is not put into questions as filler or fun. It must be relevant to guiding your decision. So - how could it be relevant? What options might it be intended to rule out? If all users have different types of phones, they would all have different experiences and needs from the app. One person, for example, might have a small screen and require the app to be designed with minimal output on each page. Another might have a phone with a stylus, which would enable hand-written input. Another might have a phone with a different constraint that would rule out an important design idea. That comment in the case study makes me lean towards option (A). But looking at (B), one realises that the manager would be an important person to consult to determine the organisation's functional requirements for the app. But will the manager be using the app - and therefore be included in option A, and be interviewed? Sadly the wording of the case study is ambiguous - a common fault in VCAA IT exams. We are told that "In the company, there is a manager and four people who sell the bicycles." This could mean...
or
Try this. What does this mean...?
Does it mean...
or
VCAA really needs a punctuation and grammar manager. As a former English teacher, these things leap out at me. And that's why VCAA exams often annoy me more than they irritate other people. But, it's section A and we can't explain our reasoning or give alternative answers to cope with ambiguities in the questions. We have to decide. Here I look at option B's data collection technique - survey - and wonder. Would a survey be sufficient? Remember - knowledge of interviews, surveys and observation are required by SD U3O2 KK 1. Let's down-vote (B). Option (C) is fair enough - observing users can uncover valuable ideas that may contribute to the formulation of functional or non-function requirements (e.g. sales staff may be very busy so the app would need to work more quickly than usual.) But only observing only one user would probably not be enough. Option (D) is feasible and might yield some insight into the requirements of the new system, but it is less valuable than getting input from the actual users of the proposed system. It's not a strong option. So, I'd say option (A) best answers the question, even though some of the others also have some merit. Fun fact 1: Inta is a feminine Latvian given name. It's about time female Latvian programmers got mentioned in an exam question.
|
||||||||||||||||||||||||||||||||||||
A16 | Question 16 Just as Toni was returning to her car in the shopping centre car park, she witnessed another car reverse into her car and drive off. She quickly took a photograph of the car with her mobile phone, capturing the registration number.
Answer is C. The PDPA of the current study design replaces the IPA (Information Privacy Act) of the old study design. It only affects Victorian government agencies (and private organisations working for the government.) 'Health Records Act' - hehehe. I wonder how many kids will choose that one. Anyway - why would an insurance company put the onus on the policy holder to identify the holder of a number plate? Silly. The Real Word™ - as mentioned several times already - does not work like that. |
||||||||||||||||||||||||||||||||||||
A17 |
Which one of the following correctly identifies features of type checking?
Answer is D. Notice that each option has two components. Both must be true for the option to be accepted. The first part of (A) may be true, but the spelling part is not. The existence check rules out option (B). The first half of (C) is OK, but the bit after the 'and' is a range check, not a type check. Both parts of (D) are fair and reasonable.
|
||||||||||||||||||||||||||||||||||||
A18 |
A data flow diagram can be used as a tool when designing software.
Answer is D. The key word is "always". (A) sounds like a flow chart or decision tree, neither of which is examinable. Such decisions are certainly not included in a DFD. (B) is project management, such as a Gantt chart. (C) A DFD does include external entities (data origins) and data stores, but the latter don't have to always appear... but any system without data stores would be a strange and rare beast indeed... (D) Yeah, that feels good. Right there. Data flows in a DFD are specific (each data flow arrow must be labelled), and data certainly flows between processes. Yep. Silly, silly examiner. DFDs are not used during design. They are used during analysis. Back to the naughty step. Go on.
|
||||||||||||||||||||||||||||||||||||
A19 |
Some of the variables in a program are to be given new names.
Answer is C. The SRS is produced during analysis and contains an overview of the purpose and aims of the software. It does not consider how these are to be actually implemented. (B) obviously refers to project management, which also is not concerned with the details of task implementation. Dang! A19 is an easy one, yet A2 dislocated several of my brain cells.
|
||||||||||||||||||||||||||||||||||||
A20 |
A local shopping centre is considering providing free wi-fi for its customers.
Answer is B. But I don't like it much. [This section is in development - which is why it rambles.] A non-functional requirement (NFR) is a quality or a performance characteristic that a solution must possess. It usually describes what a user requires from the system. Being 'easy to connect to' is such a quality. A functional requirement (FR) relates to what a system must be able to do. It often describes what a system's owner/manager requires from the system. So... FR - the system must be able to email a customer a record of a purchase. (What the system can do) But let's quibble, shall we? Do you have time? Good. Please sit down, and let's quibble together. I see an NFR is a global quality of a solution - it describes what the solution should be. A functional requirement (FR) on the other hand is an action that a solution must be able to do, particularly related to inputs, outputs and processing requirements, e.g. produce a graph of weekly sales, send an email to a customer after each purchase. Alas, FRs and NFRs are not defined in the study design. So, when did VCAA decide to define an FR as a specific, numerically-defined objective? - like a system objective? (Also see the system objective question in C2 below) I rue the day that the study design had to cut back on the scope of the glossary. It's questions like this that make such definitions essential. To quote Mr Wikipedia:
Another source says: (with my inserts in bold)
The exam's interpretation of FRs and NFRs in A20 seems to be new and idiosyncratic. End of quibble. Yes, you can stop now. Other references:
|
||||||||||||||||||||||||||||||||||||
Overall for section A - Difficult! Not many quick, easy-peasy questions. Most of them took time to ponder. There were also too many time-outs for the examiner on the naughty step. |
|||||||||||||||||||||||||||||||||||||
Instructions for Section C Please remove from the centre of this book during reading time. Use the case study provided in the insert to answer the questions in this section. Answers must apply to the case study. Answer all questions in the spaces provided. |
|||||||||||||||||||||||||
|
Patel and Janette select a software development company to develop both the new Keep Fit application (app) for their patients’ mobile devices as well as new communications software for their Soul & Body Health system to enable the Keep Fit app to communicate with their existing software. Question 1 (5 marks) Sue-Lee, the project manager, begins to plan the project. She decides to use two programming teams. a. Complete the Gantt chart below to show Sue-Lee how to complete the project in fewer than 70 days. 4 marks. Keep in mind that the testing task requires both the app and the SBH software to be finished first . b. Name one milestone for the project. 'End of Project' after the last task? No activity in the question has zero duration, so it can't be any of them. I had to invent one. This is an odd question.
|
||||||||||||||||||||||||
|
Question 2 (2 marks) Sue-Lee begins to plan the software requirements specifications (SRS). She understands that she will need to follow the goals and objectives of Soul & Body Health. Organisational goal Improve patient care. Provide holistic patient care. System objective Introduce preventive medicine techniques (to support the goal of improving patient care) Give patients detailed knowledge of their diet and exercise (to support the goal of holistic care) Objectives are short-term, practical, achievable steps towards a larger long-term, rather vague goal. Org goals and objectives affect the whole org and everything it does. System goals and objectives relate to systems within the org that should be helping to achieve org goals and objective. This - like goal/objective questions of past exams - was not easy. I'm still not sure of the sys objectives. I have a suspicion that the examiner may be conflating functional requirements and system objectives (see A20 above)
|
||||||||||||||||||||||||
|
Question 3 (3 marks) Sue-Lee now begins to prepare a use case diagram for the Keep Fit app. A patient should be able to log in and:
Complete the use case diagram below by indicating all of the requirements.
At first I added the two lines from the patient and muttered, "You mean to say - that's IT for... how many marks... three marks? For adding TWO LINES! Skippy the Bush Kangaroo could have got THAT one right... hang on. How many marks? Three? Three marks for two lines? How do you work that out... 1.5 marks per line? Or... maybe I've missed something." "Come to think of it, THAT doesn't look right... how can you cancel an appointment without the system knowing who you are? You'd have to ... LOG IN FIRST! " "Ahhhh. And would it be necessary to log in to book an appointment? Maybe not. I could imagine a system where a stranger books an appointment for the first time and becomes a registered patient upon their first visit. Not sure. I'll put it in two <<includes>>, just to be safe." "But on the other hand, there are three marks available - two marks for the association lines and one for the <<includes>> from 'cancel appt' - and I've added four items." "Also, that <<includes>> line from 'Book appt' to the login use case crosses the association line, which looks really awkward and ugly. So maybe there's only one <<includes>> arrow. OK. Maybe I was right - there's no need to already be on the system to be able to make an appointment. You'd think they might have mentioned that in the case study. But anyway..." Which led to this: The morals of the story:
|
||||||||||||||||||||||||
|
Question 4 (4 marks) Patel and Janette have asked the developers to take a simple approach to the design of the Keep Fit app. They want error-handling features, simple navigation between the components of the solution, and a clean and clear interface that allows for easy data entry regardless of the device. They also want it to be interesting to look at.
a. Describe one feature of each design idea that contributes to its effectiveness. 2 marks Feature of Design idea A Sensible and time-efficient, easy-to-use data entry control choices, such as the calendar and slider, compared to the ugly and awkward scrolling and text entry needed for design idea B. Feature of Design idea B Text on the controls main screen with text to explain their purpose, rather than the potentially-confusing or meaningless icons of design idea A. b. Which design idea would you choose based on the stated requirements? Justify your choice. 2 marks Both offer error-handling (home/reset links). The text-based navigation of idea B is clearer and simpler. Idea A is more interesting to look at, and allows for easier data entry. Since the ease of data entry is especially important, I'd choose idea A because of its superior choice of appropriate data entry controls.
|
||||||||||||||||||||||||
|
Question 5 (3 marks) Sue-Lee also looks at the flow of data to and from the Keep Fit app and the Soul & Body Health system by starting to draw a context diagram.
Query - is the app meant to be seen as part of the Soul & Body Health system? If so, the app cannot not be classed as an external entity. That's how I read it. Instead, the patient would be the data provider/entity. Note 1 - the question is asking for a data flow FROM each entity, not TO it. This is difficult in the case of the health care system since the case study only describes data flows TO it, not FROM it (rebate claims, other data files). I believe the question was worded incorrectly. Rather than invent an data flow FROM the healthcare system, I've assumed the question was bad and provided data flow TO it. That, I figure, is What The Examiner Wanted Me To Say. Sit on the naughty step.
Note 2 - assuming that one entity is a clinic, what data flows are described in the case study between SBH and the clinic? None that I can see. Do we have to invent one as we did with the Gantt chart milestone? STUDENTS SHOULD NOT HAVE TO BE EXPERIENCED BUSINESS OWNERS in order to figure out how The Real World works and invent probable scenarios in an exam! And, back you go.
Now, let's see. If my interpretations above are right, two sits on the naughty step must add up to one Dog's Breakfast Award.
|
||||||||||||||||||||||||
|
Question 6 (4 marks) The Keep Fit app will require access to the kilojoule content of a large selection of foods. Ethan, a member of the software development team, suggests that this data be stored on the mobile device where the app is installed. Sue-Lee feels that the data should be stored centrally at the Soul & Body Health head office and accessed over the internet. a. State two advantages of Ethan’s method. 2 marks The app can access the kilojoule data more quickly than having to download it. The app can use the data even when the internet is inaccessible (e.g. the phone is out of range, or 3G/4G is turned off by the user to save money) b. State two advantages of Sue-Lee’s method. 2 marks Data storage space on the phone will be reduced. Data can quickly and easily be added or changed centrally without having to repeatedly send large update uploads to all phones. |
||||||||||||||||||||||||
|
Question 7 (9 marks) The system at the Soul & Body Health head office will need to store sensitive information. a. Identify one appropriate security measure that could protect this data and explain how the measure would protect the data. 3 marks.
b. Describe one backup procedure that could be used to back up this data. Make reference to the technique used and the frequency of the backup procedure. 3 marks.
Did you know: Rumours of the demise of tape backups have been greatly exaggerated. Tape backup is still alive and well in the corporate world, and can still kick hard disk's backside in terms of storage capacity and speed. Amazing, but true. c. It has been suggested that patients who have not visited Soul & Body Health for over five years should have their records archived. Explain what is meant by archiving and provide one advantage of archiving records. 3 marks Archiving is the copying of old, unwanted, irrelevant, bulky records to offline storage (for example disc, tape, hard disk) that is still accessible, but requires media to be located and loaded before data can be read. The original data is deleted after being copied. The advantage of archiving is that storage space is freed up for new, active data. Note my use of emphasis to mark the answer to each part of the question, and to stress key concepts that make all the difference, such as the deletion of archived data (compared with backup data which is copied and retained in place.) If you make the marker's job easier by stressing key parts of your answer, everyone is better off. In an exam, you can underline or highlight key text.
|
||||||||||||||||||||||||
|
Question 8 (5 marks) The new software for Soul & Body Health’s system will be receiving sensitive information from the new Keep Fit app from all of the patients. Sue-Lee is investigating how the mobile devices could send this information as securely as possible. To do this, she is exploring the use of protocols. a. Apart from the patient’s name, list two different pieces of sensitive information that the new software will need to keep secure. 2 marks. Bank account / PayPal account details. Personal information of diet and exercise. (Note - medical records would not be sent from the app. They are stored on the HQ's file server, but not sent by users of the app.) b. Identify a suitable protocol for securing this sensitive information and explain how the protocol achieves this. 3 marks I reckon the question is fishing for an answer like SSL or TLS over HTTP so web traffic is encrypted by the sending device, and decrypted by the receiving device, making it unreadable if it is intercepted in transit. But the case study gives no clue about how the app communicates with the SBH system. Does all 3G/4G mobile phone traffic travel via HTTP? I dunno.
|
||||||||||||||||||||||||
|
Question 9 (5 marks) A commercial software company has contacted Patel with a proposal about some newly developed software that is suitable for Soul & Body Health’s system. The software would search the data and provide extra information about the patients, which could help Soul & Body Health improve its business. a. What is this process called? 1 mark Data mining. b. The software company is willing to load its software onto Soul & Body Health’s system so it can provide information automatically. Patel is concerned about how this new software will affect the rest of Soul & Body Health’s system. Discuss two technical issues Patel should investigate before making a decision regarding the offer. 4 marks 1. Whether the system has the capacity to do its normal business and also run the mining software. 2. Whether the software is compatible with his system. 3. Whether the software may contain malware, spyware or other PUP (potentially unwanted program) that may damage or steal data from his system. Issues such as cost, ease of use etc are not relevant because the question asked for technical issues.
|
||||||||||||||||||||||||
|
Question 10 (3 marks) Patel has questions about the use of patient information. He is concerned about who owns the patient information stored on Soul & Body Health’s system and what his legal obligations are concerning this information. 1. Patel is subject to the Privacy Act 1988 because he holds health information about people. He must ensure that the information: is well protected and not used for any other purpose than that for which it was collected; not disclosed; is accurate, complete and up to date. He must also clearly advertise his privacy policy and allow information owners to check what is stored about them. 2. Under the Victorian Health Records Act 2001 - basically everything is repeated as for the Privacy Act. 3. Under the Spam Act 2003, Patel would need to know that the software would not be used to send unsolicited commercial email to patients. The relevance of the Spam Act is a bit of a stretch, I grant you, but three actions are needed. Maybe I could have unpacked required actions from the Privacy Act and just used those. The question did not demand three different laws to be quoted; it asked for three actions, and there's no reason they could not have been based on a single relevant law. I went the difficult route to show you how the question might have been handled. The first paragraph of the question relates onto to privacy legislation, but the rest of it only refers to "legal obligations" in general, not purely those related to privacy. So it might be relevant to bring in the Copyright Act 1968 and say that Patel must ensure the software is legally owned by the seller. Again, a stretch. Note that the Privacy and Data Protection Act 2014 is not relevant since S&BH is not a state government body or agency. Also, the only other legislation - the Charter of Human Rights & Responsibilities Act (Vic) 2006 - doesn't have any relevance to this case. Hmmm. The 'three' in the question was not highlighted, as numeric parameters usually are.
|
||||||||||||||||||||||||
|
Question 11 (4 marks) Soul & Body Health’s new software will be able to connect to the national healthcare system so that patient healthcare numbers can be verified. List two characteristics of data that has integrity and explain one method Sue-Lee could use to check the integrity of the data. (A healthcare number contains 10 digits, as shown on the card above.) Data with integrity is: complete; accurate; up-to-date; internally consistent; valid; trustworthy; authentic. Explanation Any one of these: A type check could discover if a number contained any character other than a digit or space. An existence check could find numbers that have not been entered. A range check could detect numbers that had the wrong number of digits.
|
||||||||||||||||||||||||
|
Question 12 (8 marks) The Keep Fit app will record all exercise that a patient does and calculate the energy used. It will give the patient a choice of exercise style and then ask questions such as distance travelled and how much time the exercise took. a. It is necessary to make sure that the speed is within these limits. What is this input testing called? 1 mark Validation. I assume that's what they want to hear. b. Sue-Lee has written the following pseudocode to check that the speed meets this range. ' Again, the exam's indentation is incorrect. The second line should be pushed in. Onto the step. Complete the following test data table to fully test this pseudocode. 4 marks
Again, the tiny "=" in the pseudcode is the villain. It always is. c. What is the invalid response produced by the pseudocode given in part b.? 1 mark It marks speeds of 1 and 30 as valid, but it supposed to identify them as invalid. Huh? "Response"? The pseudocode has no "response" - no message or action. Perhaps the question meant to say "What is the inappropriate action taken..." d. Rewrite the pseudocode given in part b. so that it works correctly. 2 marks. To save time, just remove the two equals signs from line 3.
|
||||||||||||||||||||||||
|
Question 13 (5 marks) At the end of each day, the federal government requires a summary of who has been treated under its health plans and what treatment they received. a. In terms of the structure of the file, what advantages does an XML file have over a simple file? 2 marks. It contains not just the raw data, but information (metadata tags) on the field names and structure of the data. This makes the file self-descriptive. It lets any database read and interpret the file as a database table. b. The federal government requires the transmission of this file via a virtual private network (VPN). Explain one advantage of using a VPN over another form of transmission. 3 marks. It's a private, encrypted channel using the normal internet infrastructure, so it's relatively cheap and easy to set up (compared to laying a private cable from point A to point B), yet it is very secure. That's it. All done for another year. |
||||||||||||||||||||||||
END OF QUESTION AND ANSWER BOOK |
|||||||||||||||||||||||||
Back to the IT Lecture Notes index
Back to the last page you visited
Created 10 November 2016
Last changed: March 9, 2022 11:35 AM
Original Content © Mark Kelly 2016
Images and questions are © Victorian Curriculum
and Assessment Authority 2016.
Reproduced here with permission for educational purposes.
Thanks, VCAA!
VCE Applied Computing Notes © Mark Kelly
Section C summary
Section C was a bit more gentle than in some previous years that threw up nasty and complicated code walkthroughs or stack simulations.
The formatting of the pseudocode was just plain sloppy. The indentation and bolding of the keywords was all over the shop.
More room to answer sometimes needs to be provided.
The examination of new theory (e.g. hash functions) was handled with care and grace.
The wording of some questions was dubious, for example C5 asking for a data flow from an entity that has no such flow provided in the case study.
C8b was weird. Students are supposed to be experts on mobile phone communication technology? If you want to examine SSL/TLS, do that. Don't muddy the water.