VCE Applied Computing units 1 and 2 |
KK = Key Knowledge. All KK are examinable (as are all terms in the glossary that are relevant to this course) links to a (big) slideshow if the icon has a label beside it links to a webpage on this site. Check out my the postmortem of VCAA's 2020 sample DA exam with lots of exam tips. |
AC U1O1 KK01 | Types and purposes of qualitative and quantitative data
Qualitative and quantitative data
|
AC U1O1 KK02 | Characteristics of data and information
Data are raw, unprocessed observations of reality, e.g. the current temperature. Information is data that has been processed (summarised, totalled, visualised, categorised, sorted, etc). e.g. The average temperature on this day at this time over the past decade. "Raw" data (a tautology - all data by definition are "raw") are usually bulky and impossible for humans to make sense of. Information provides data in a form that makes sense to humans (e.g. a graph of a million numbers). Warning: information may be unreliable because its data has been processed...
|
AC U1O1 KK03 | Sources, methods and techniques for acquiring and referencing primary and secondary data and information Primary and secondary data and information
|
AC U1O1 KK04 | Interpretation of information for communication and decision making
|
AC U1O1 KK05 | Factors affecting the quality of data and information, such as
|
AC U1O1 KK06 | Characteristics of Data types and Data structures relevant to selected software tools
|
AC U1O1 KK07 | Procedures for the legal and ethical collection and use of data and information, such as using consent forms
|
AC U1O1 KK08 | Techniques for protecting data and information from misuse, such as de-identifying personal data and the use of Physical and Software security controls |
AC U1O1 KK09 | Structural characteristics of spreadsheets and databases, such as cells, fields, records and tables
SpreadsheetsA spreadsheet is really a flat-file (single-table) database. The basic unit of data is the cell - where a row and column intersect. Cells are referred to using a grid reference showing the row as a letter and the column as a number Usually, a column is a field (a data item like a surname). Usually, a row is a record (a complete collection of fields describing an object such as a person). Rectangular groups of cells can form a table of data called a range. A range is described by naming the cell at the top-left corner and the cell at the botton-right corner. e.g. range B3:E6 is the group of cells with top-left corner being cell B3 and the bottom-right corner cell being E6. A unique feature that spreadsheets have is the sheet - any number of spreadsheet 'pages' that can be used for different purposes, such as lookup tables, graphs, summary output, raw data etc to keep them out of the way.
|
AC U1O1 KK10 | Types and purposes of Data visualisations suitable for educating, entertaining, informing and persuading audiences Data Visualisation - a page that will be forever in development
|
AC U1O1 KK11 | Functional and non-functional requirements of Solutions, constraints and scope Software requirement specifications (SRS) Functional and non-functional requirements Functional requirement (FR) - things that a solution should be able to do (e.g. convert dollars to yen) Non-Functional requirement (NFR) - a quality or attribute a solution should have (e.g. be easy to use, be flexible, be able to work with all the major web browsers) Constraint - a factor that restricts the choice of design options e.g. solution must work on a phone, must be developed within a month, cannot exceed 32MB in size. Scope - the limits of functionality that the solutions must be able to provide, e.g. must work at least with Windows 8-10, must support Australian tax codes up to 2025, must be able to process orders from any Australian state or territory. The scope is defined so the developers have a clear set of FRs and NFRs they need to provide: anything beyond the specified scope is officially Not Their Problem. e.g. Software Client: I've had complaints from New Zealanders that your program won't accept their orders. Developer: Look at the scope definitions in the SRS. It's Not Our Problem.
|
AC U1O1 KK12 | Design tools for representing the functionality and appearance of
such as
Entity relationship diagrams (ERD) for databases Website design tools (sitemaps, storyboards)
|
AC U1O1 KK13 | Formats
and Conventions suitable for databases, spreadsheets and Data visualisations
|
AC U1O1 KK14 | Software functions and techniques for efficiently and effectively manipulating, Validating and Testing data to develop databases, spreadsheets and Data visualisations
Comment: How do you "test data"? It does not make sense to me. |
AC U1O1 KK15 | Australian Privacy Principles relating to the acquisition, management and communication of data and information including
|
AC U1O1 KK16 | Ethical issues arising from the acquisition, storage and use of data and information.
|
AC U1O2 KK01 | Functions and capabilities of key hardware and software components of digital systems required for processing, storing and communicating data and information
|
AC U1O2 KK02 | Characteristics of Data types
|
AC U1O2 KK03 | Types of Data structures
On the way: Stacks, queues
|
AC U1O2 KK04
|
Features of functional and non-functional Solution requirements, constraints and scope |
AC U1O2 KK05 | Design tools for representing the functionality and appearance of Solution designs such as
Entity relationship diagrams for databases Website design tools (sitemaps, storyboards)
|
AC U1O2 KK06 | Naming Conventions for Solution elements such as files, functions, methods and variables
|
AC U1O2 KK07 | Processing features of a programming language Processing Features of a programming language - functions, statements etc
|
AC U1O2 KK08 | Characteristics of internal documentation
|
AC U1O2 KK09 | Formatting and structural characteristics of input and output such as file formats
Also see brief notes about text and CSV files on the SofDev page |
AC U1O2 KK10 | Testing and debugging techniques to ensure software Solutions meet requirements such as test tables and test data
Trace tables and desk checks (programming)
|
AC U1O2 KK11 | Techniques for evaluating the Efficiency and Effectiveness
of software solutions Evaluation (Problem solving methodology)
|
AC U1O2 KK12 | Project plans to coordinate and monitor the tasks, including
to create software Solutions.
|
AC U2O1 KK01 | Components of digital systems
|
AC U2O1 KK02 | Types of digital devices used for a range of current and emerging applications such as
|
AC U2O1 KK03 | Emerging trends in digital systems and the importance of innovation to organisations, such as improving Efficiency and Effectiveness
of customer service and maintaining competitiveness Efficient and effective solutions
|
AC U2O1 KK04 | Functions and capabilities of digital systems used by individuals and organisations, such as
|
AC U2O1 KK05 | Techniques for collecting data to determine user needs and requirements, such as
|
AC U2O1 KK06 | Techniques for documenting the development of Solutions
I'm not sure what this KK (key knowledge) wants. Is it literally the VCAA-defined development stage of the PSM (Problem-solving methodology)? Or is it referring to the overall development of a solution from analysis to evaluation? Seeking guidance. Assuming it's just the development stage of the PSM: Development documentationWhat it is - a written record of what has been development has been done, by whom, when, and why. If necessary, also how it was done. Why it is done - to record the progress of a solution. This can be used to:
|
AC U2O1 KK07 | Solution specifications such as
|
AC U2O1 KK08 | Characteristics of creative and innovative Solutions
What are some historical creative and innovative solutions?
In summary, ground-breaking innovative solutions:
In short innovative solutions have this effect...
|
AC U2O1 KK09 | Design tools and techniques for representing Solution designs, such as
Entity relationship diagrams (ERD) for databases Website design tools (sitemaps, storyboards)
|
AC U2O1 KK10 | Functions and techniques for developing innovative Solutions
|
AC U2O1 KK11 | Techniques for Validating and Testing Solutions
How can one validate a solution? You validate data. |
AC U2O1 KK12 | Evaluation criteria and techniques for evaluating the Efficiency and Effectiveness
of innovative solutions
|
AC U2O1 KK13 | Tools and techniques for coordinating and monitoring projects, such as Gantt charts
The examiners don't mention PERT charts, but then again they don't mandate Gantt charts. Please admire the real useful beauty of PERT charts.
|
AC U2O1 KK14 | Goals and objectives of digital systems Goals and objectives (of organisations) Strategic, tactical and operational goals and objectives
|
AC U2O1 KK15 | Economic issues involving emerging technologies, such as access, deskilling, job loss, misuse and sustainability
|
AC U2O1 KK16 | The impact of current and emerging technologies, such as automation, cyberbullying and the decline of physical human interactions and interpersonal skills
|
AC U2O1 KK17 | Key legislation and how emerging technologies are affected by:
|
AC U2O1 KK18 | Ethical issues arising from the development of emerging technologies. |
AC U2O2 KK01 | Applications and capabilities of LANs, Wide Area Networks (WANs) and Wireless Personal Area Networks (WPANs) Networks - LAN, WAN, Internet, VPN
|
AC U2O2 KK02 | Functions and characteristics of key hardware and software components of networks required for communicating and storing data and information
|
AC U2O2 KK03 | Strengths and limitations of
measured in terms of
Wired - Wireless (under construction)
|
AC U2O2 KK04 | Technical underpinnings of intranets, the internet and virtual private networks
Networks - LAN, WAN, Internet, VPN
|
AC U2O2 KK05 | Design tools for representing the appearance of networks
|
AC U2O2 KK06 | Security threats to data and information, such as
|
AC U2O2 KK07 | Technical underpinnings of malware that can intentionally threaten the security of networks, such as
|
AC U2O2 KK08 | Data and network protection strategies, such as
|
AC U2O2 KK09 | Preventative practices to reduce risks to networks, such as
|
AC U2O2 KK10 | Technical underpinnings of
|
AC U2O2 KK11 | The role of ethical hacking
|
AC U2O2 KK12 | Risks and benefits of using networks in a global environment
|
AC U2O2 KK13 | Key legislation that affects how organisations control the storage and communication of data and information:
|
AC U2O2 KK14 | Ethical issues arising from data and information security practices.
|
Go back to wherever you were before this page All original content copyright ©
vcedata.com This page was created on 2022-01-17 |