Last changed: August 3, 2024 2:30 PM
Applied Computing - Software DevelopmentVCAA Exam Post Mortem 2023Due to the level of public disinterest, this page will apparently never be finished. Feel free to pick a bone with me or offer further information or corrections . Or, to send attachments, email
|
Post Mortem Notes This is not a VCAA publication.
I do not speak for the VCAA, the IT examiners, or exam markers. I was not involved in the writing or marking of this examination. Extracts from exams are all Copyright © VCAA, and are used with permission. Use these post mortems at your own risk. I reserve the right to change my mind completely, at short notice, about anything I've said here. Suggestions, discussions and corrections are welcome. Questions look like this. |
Other VCE IT Exam Post Mortems to enjoy IPM / ITA / Informatics / Data Analytics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2023
|
The Post Mortem Awards |
|
Questions that are a complete dog's breakfast |
The Sad Dog Award goes to questions that made me sad |
Written examinationReading time: 2.00 pm to 2.15 pm (15 minutes) Writing time: 2.15 pm to 4.15 pm (2 hours) QUESTION AND ANSWER BOOK Structure of book
Materials supplied
Instructions
At the end of the examination
Students are NOT permitted to bring mobile phones and/or any other unauthorised electronic devices into the examination room. |
||||||||||||||||||||
Examiners' report general comments May come, eventually |
SECTION A - Multiple-choice questionsInstructions for Section A Answer all questions in pencil on the answer sheet provided for multiple-choice questions. I love the way VCAA quietly admits that all of their options may be incorrect. A correct answer scores 1, an incorrect answer scores 0. |
|||||||||||||||||
Use the following information to answer Questions 1—3. The following pseudocode describes a search algorithm. Part of a trace table for the algorithm is shown below.
|
|||||||||||||||||
A1 | Question 1 The type of algorithm shown in the pseudocode is a Answer is A. OK. It's a pretty easy introduction to the exam. The examiners are giving you a freebie: the function in the pseudocode is called "Search" Two of the options are... sort. So you can dismiss B and D immediately. The telltale is(low+high)/2. It is finding the mid-point of the data set, preparing to reject one half of the data, as a binary search does. Remember that the data needs to be sorted for a binary search to work. The other option, linear search, works by dumb (but easy to program) brute-force, checking each item in the data set in turn to see if it matches the value being sought. It's the Donald Trump of search algorithms: slow, and simple. Commentary: I haven't done a post-mortem of a SD exam for a few years, and the pseudocode seems to have changed. It used to be extremely simple, plain-English style, but this pseudocode looks very much like Visual BASIC: it identifies itself as a function, it lists its parameters, it returns values. Rather baffling is the "Return -1" near the end. I assume it's meant to signal a failure to find a match, but the intention of the pseudocode is far from obvious - and the entire point of pseudocode is that its intentions must be obvious. "Return False" would have been a bit clearer. After all, -1 in most programming languages signifies a logical TRUE, and zero is FALSE.
|
||||||||||||||||
A2 | Question 2 Which one of the following lists of numbers could have been used in this trace? This is a tough one. Answer is D. 1. Data must be sorted for a binary search to work. That immediately rules out option C. 2. Lines numbered 3 tell us we know we need an option containing 17 and 23. That quickly rules out B. Start by eliminating the impossible options, then focus on the remaining candidates. We now only have to look at half of the options. Mental Note 1 - the mid value is apparently an integer, which is why (0+9)/2 gives a mid of 4, and not 4.5 Mental Note 2 - the list[ ] array must start with index zero - i.e. it has 10 'slots' numbered 0-9. This is crucial when identifying which slot values to look at. Option A - On the first iteration (look it up - I can't spoon-feed you all of your life) of the WHILE loop in line 3, we compare the target value (25) with list[4] while remembering the array count starts with index 0, so we need to look at the fifth value in the list). Option A's fifth value is... 25. So, that doesn't match the trace table's results Option D - fifth value in the list is 17. Yay. So far so good, but don't jump to conclusions. Follow the rest of the trace to back up your gut feeling. You might have missed something. Tentatively assume option D is right. Work through the trace table as if that were correct. The second iteration (did you look it up? I'll be annoyed if you didn't) of the loop compares the target value with 23 - which happens to be list[7]. Bingo. We have confirmed our winner. I had the luxury of unlimited time and an excellent BACKSPACE key to hide my errors. It certainly took me more than 1.2 minutes to work it out. The subtle implications of the zero-based array indexing itself would have tripped up many a student who assumed that the first number in an option was stored in list[1] and not list[0]. This question, while fair, would have been pretty damned difficult for nervous young students under exam time constraints.
|
||||||||||||||||
A3 | Question 3 In the algorithm provided, the statement ‘Else’ relates to which one of the following control structures? Answer is B. We seem to be leaping from the overly-complicated to the overly-simple questions. A. Iteration is looping - e.g. WHILE / END WHILE (WEND), DO / LOOP, FOR / NEXT. B. Selects which lines of code to execute - e.g. IF / ELSE / END IF C. A method is a procedure that can be used on a class of object. e.g. window close. text erase. dog scratch his furry face. D. A function is a self-contained piece of code that can take incoming values (parameters), calculate a value and return the value to the code that called the function. e.g. square root, convert to uppercase, decide if a year is a leap year or not. |
||||||||||||||||
A4 |
Within an application’s code base, comments can be used to describe the function of particular sections of code and support future maintenance of the application. A. Comments are stored in a separate file to the code. Answer is C. What a dumb question. I mean - we go from the complexity of A2 to this snotty-nosed heap of parrot droppings? |
||||||||||||||||
A5 | Question 5 The following lines of data need to be stored within a program.
A. a record Answer is B. A. A record is a set of fields (columns) that make up the data for items (rows). Irrelevant here. A record would be one row, not a collection of rows. B. Both columns contain alphanumeric (alphabetic and numeric) data, so strings are appropriate. String = text. C. Only a few of the fields contain integers, so this can't be it. D. An associative array is one where you can you use one unique field (e.g. a person's name) to look up a value associated with that field (e.g. that person's phone number). The duplicated values of "B" and "1" prevent us using this data as a lookup table. Again - pretty basic.
|
||||||||||||||||
A6 | Question 6 In which stage of the problem-solving methodology does collecting data to determine requirements take place? Answer is a reluctant B. Logically, it must be B, but the question is, strictly speaking, beyond the scope of the study design. If you have read VCAA PSM (Problem Solving Methodology) dogma in the 2020-2024 study design you will know that the Analysis Stage includes the skill of being able to 'Identify and clarify the data and information that needs to be collected....' So, that is very tempting. But it just says identify and clarify the data that needs to be collected. Then it wants you to critically analyse the sources of data and information to determine the reliability of it. What about actually collecting the data? What stage of the PSM includes that? None.The study design's PSM never says when you collect the data. It must be inferred or guessed by students. The exam is asking for information that is not provided in the study design. I have written to the exam department of VCAA to challenge this dodgy question. |
||||||||||||||||
Use the following information to answer Questions 7 and 8. Poh is planning to introduce new software. When checking the customer satisfaction logs of the existing system, Poh identifies that the current software does not cater to the needs of users from diverse cultural backgrounds. |
|||||||||||||||||
A7 | Question 7 In analysing the needs of the new software, which data collection technique is Poh using? A. logs presented in a report Answer is a VERY reluctant A. Either I'm getting way too pedantic in my old age, or this exam is falling apart at the seams. Could go either way... A log in a report is not a 'data collection technique'. It is the result of a data collection technique (such as interviews, observation, surveys) which provides the data that are then stored or summarised in a log. The examiners are probably expecting students to choose option A because the question said Poh was "checking the customer satisfaction logs of the existing system". But where did the data in in the logs come from? Interviews? Observation? Surveys? It is impossible to say.The exam certainly doesn't say. So, start drafting your complaint emails to examinations.vcaa@education.vic.gov.au, and choose what the examiners probably wanted you to say. Option A, |
||||||||||||||||
A8 | Question 8 Given that Poh is looking to meet the needs of users from diverse cultural backgrounds, what type of constraint would this place on the development of the solution? Answer is B. I mean - what else could it be? I saw a possum up a tree yesterday. He was a particularly stupid possum, being out at noon. But I bet even he could have answered A8. Are the examiners giving a series a dumb questions to compensate for the brain-numbing A2? |
||||||||||||||||
A9 | Question 9 If the completion of an entire project is delayed because one particular task has taken longer to complete than expected, that task must be Answer is C. A. You KNOW a milestone is an event and has zero duration and cannot affect the duration of a project. Don't you? If not - download the slideshow here. B. I once grew a cellular slime mould in a Petri dish. It had no brain. Even HE would not have selected this option. C. By definition, any task on the critical path cannot have its duration changed without affecting the finishing date of a project. So this is it. D. Why is the last task special? Nope.
|
||||||||||||||||
A10 | Question 10 Under the Privacy Act 1988, organisations are required to Answer is B. In order of silliness, to save time: C. Is ridiculous,. Cross it out. Spit on it. Grind it under your heel with intense vigour. Enjoy listening to its screaming during its evisceration. Sorry. Got a bit carried away there. This option is not acceptable. (But you can still spit on it, if you want.) D. Is dumb. And actually impossible. Good cloud storage is redundantly and automatically backed up to several locations, unknown to the owner of the data - and probably even to the cloud host. A. Is impossible. If, for example, your phone company was forced to remove all of your contact information, how could it sent you your next month's bill? It just does not work. That leaves B. Once again, it was easy to eliminate several options without breaking a sweat. B. Notifying people about why you are collecting their personal data makes sense. It is fair and sensible. As my mother always told me as she tucked me into bed, "IPP (Information Privacy Principle) 1.3 requires organisations to take reasonable steps to notify individuals that their personal information has been, or will be, collected, and to inform them of other matters such as which organisation collected the information and why it was collected." But my mother was a bit odd. Don't give your your mum unnecessary grief. She already has enough of her own. But trust her when she explains information privacy legislation. |
||||||||||||||||
A11 |
Moe regularly uploads large files (1-2 GB) to an online cloud storage provider and is concerned that his uploads are taking longer than he expected. He investigates a series of possible upgrades that he hopes will improve his upload speeds. The upgrades are shown in the following table.
Considering the information above, which upgrade would be most likely to reduce the time to upload the files to the cloud storage provider? Answer is C. A. Even the slowest hard disk on the planet has a data tranfer speed that is FAR faster than an excellent internet upload speed. A typical HDD transfers data at 30-150 Megabytes per second. So, we're talking 240-1200 Megabits per second (Mbps). A good upload speed today is about 40Mbps. Hard disk speed is not a factor in upload slowness. The unit for data storage is the byte (8 bits). The (usual) unit for data transmission is the bit. Don't embarrass yourself and your entire family by confusing the two. Some web browsers annoyingly confuse matters by measuring data transmission speeds in bytes per second. They need to be spanked. On the bottom. 'Byte' is abbreviated to a capital B. 'Bit' is abbreviated as a lowercase b. So - MB = megabytes. Mbps = megabits per second. B. Once again, the speed of wifi (54Mbps or 1.3Gbps in the question) is FAR faster than the speed offered by an internet service provider. It's like buying a Ferrari in the hope of getting through peak hour traffic more quickly. Learn your units. SD exams will assume you know them.
C. The upload speed to the internet is the critical factor in this question. Going from 20 to 50 Mbps would certainly improve Moe's upload speed. This is the way. (This is the way) If you don't watch The Mandalorian, ignore this line and move on. If you're a keen cloud storage user, find the fastest UPLOAD speed you can amongst available ISPs. You won't regret it. e.g. Aussie Broadband currently (2023) offers plans with 50/20, 100/20 and 250/25 download/upload rates. Exetel also offers 100/40, which is great for cloud uploads. Shop around. Why are ISP download speeds typically much faster than their upload speeds? Because most users download much more than they upload. This asymmetric (unbalanced) speed difference has been around for donkey's years - It's where ADSL comes from.. It might change in the future as cloud storage requires faster uploading. D. Again, RAM size will have little or no effect on upload speeds.
|
||||||||||||||||
A12 |
An online store is developing a software solution that will improve order tracking, including sending mobile phone notifications directly to customers as their order is processed, sent and delivered. Answer is D. A goal is a rather vague, long-term, and hard to measure ambition that an organisation or solutions wants to achieve, such as "Being popular." But how can you measure your progress towards such a vague target? You need specific objectives that have clear and measurable achievements.e.g. "Being popular" (goal) may be broken down into smaller and specific steps such as: 1. Being in the "XYZ Survey's" top 5 companies or products within 12 months. 2. Outselling competitor X by 10% in Australia within 6 months. Objectives tend to have numbers in them, so they can be measured and be found to have achieved or not. Goals are long-term, vague, and it's nearly impossible to confirm their accomplishment. e.g. "We are proud to announce that we officially became popular at 2:37PM last Tuesday. Yay!" So - we should look for numbers in the options. A and C are goals. Vague, waffly, hard to measure long-term ambitions. Ignore them. B and D have a number. That is good, objectively speaking. But which to choose? B is VERY specific. It measures both quantity and time. That is Good. But does it relate to improving order tracking, as the question demands? No. It is about the quantity of sales, which is another matter. D measures the count of complaints about lost orders. It is acceptable as an objective: it is specific and measurable. But most importantly, it relates directly to order tracking. When in doubt, read the question again. I dithered for a while between B and D until I re-read the question and realised the relevance of their objectives.
|
||||||||||||||||
A13 |
In which stage of the problem-solving methodology is a strategy developed to determine whether a solution has met requirements? Answer is C. Duh. If you had to even think about this one, you shouldn't be allowed out on the street unless you are on a leash. The examiner did you a favour by leaving out "testing" as an option. I would have included it instead of 'design' just to mess with your minds. The examiners love their PSM. Read it carefully in the study design, even if your preferred PSM is more... agile.
|
||||||||||||||||
A14 |
Stephen is writing a block of code that will accept coordinates as parameters and return a Boolean value to indicate whether the given location is on land. This code will be called from multiple different parts of his program. Answer is C. Easy as that. A. A control structure lets a programmer determine which bits of code are executed. e.g. IF/ELSE, and loops. B. An instruction is a key word that the programming language recognises as a command, e.g. INPUT, PRINT, JUMP. C. See A3 above. This is what you want. D. A method is an action or procedure that can be applied to a particular type of object. e.g. a textbox can be CLEARed, but cannot have an item added to it, as a listbox can. A Boolean value can only be a logical TRUE (usually represented by -1) or FALSE (usually represented by zero).
|
||||||||||||||||
A15 |
The following diagram represents a data structure that can be used to organise related data of a single data type. The index for the data structure uses integers.
Which of the following data structures does the diagram represent? Answer is A. I did not like this question. It was artificial and vague, We can rule out C because a variable can only be a single value. Are we to assume that the first line of numbers are the index numbers? Apparently. But this is not made clear. The second line of numbers could be a record. A record contains a set of fields (values) related to a single entity, such as a person or product. But the fields in a record do not need have to be of a single data type. e.g. an employee record may contain text (surname), date (of birth), and numeric (number of legs) fields. So, with "single data type" the question seems to be fishing for an array. That leaves A and D. An associative array needs two dimensions - a lookup value and an associated value, e.g. lookup the employee's ID in one field and fetch their surname in another field. The data provided only has one dimension of data, so there is nothing to associate with. So, it must be A. I still don't like this question.
|
||||||||||||||||
A16 | Question 16 John and Deepa are discussing characteristics of efficient and effective software solutions, in preparation for writing some evaluation criteria. Answer is B. Definition time again. Your brain should be buzzing at the word "effective". Rule out C (cost) and D (speed) because they are efficiency, not effectiveness. OK. We're already halfway there. Easy. The sacred VCAA glossary says that:
Completeness is in the list. Authenticity is not. (But I think it should be.) Don't be misled by SD U4O2 KK06, which doth declare that students shouldst know "characteristics of data that has integrity, including accuracy, authenticity, correctness, reasonableness, relevance and timeliness" Good data integrity and good solution effectiveness have some overlap, but they are not the same beast. It's a rather boring question based on memorising VCAA's glossary definitions, which is both dull - and debateable. |
||||||||||||||||
A17 |
A finance officer at a school receives an invoice via email from the school’s regular stationery supplier. He notices that the supplier’s banking details on the invoice have changed. Answer is D. Rest assured: the examiners were entitled to ask about MITM attacks - it is listed in the KK of SD U4O2 KK03. The fact that the genuine message was manipulated between being sent and and received points to a MITM exploit. In a MITM attack, the bad actor incercepts a message, records and/or changes it (e.g. the banking details), and passes it along it its intended recipient. TLS (or old SSL) encryption can authenticate one or both parties in a communication. |
||||||||||||||||
A18 |
A website allows users to add product ratings or reviews without logging in or demonstrating that they have ever purchased the product they are reviewing. Answer is C. A. It may be inaccurate. But it need not be. B. Timeliness is not a factor. It refers to being ready when needed. It does not refer to being up-to-date. C. Data authenticity refers to whether data comes from the source that it claims to come from, and that it is reliable and accurate. Fake reviews lack authenticity because they are... not authentic.They're pretending to be real. D. You have better things to do than think about option D, such as breathing and digesting your lunch. It was a desperate dive by the writer of the question. Bottom soundly smacked.
|
||||||||||||||||
A19 |
Use case diagrams are used to outline and summarise how Answer is B. Don't confuse a UCD with a Data Flow Diagram (DFD). That is all. Download the UCD slideshow. |
||||||||||||||||
A20 |
The Health Records Act 2001 applies in which one of the following places? Answer is A. This is a cheap and nasty question, It just wants students to memorise legislative origins. The HRA is Victorian state law. It only applies in Victoria. Surely the examiners could have come up with something more intellectually changing. Apparently not.
|
||||||||||||||||
Overall for section A I'm not overly impressed. SD exams used to be a bit classier than this.
|
|||||||||||||||||
SECTION B - short answer questionsInstructions for Section B [x lines] indicates the number of ruled lines provided on the paper for the answers. |
B1 | Question 1 (2 marks) Identify and describe one characteristic that a well-constructed software requirements specification (SRS) would have. Description of the functional and non-functional requirements. Description [3 lines] This sets out all of the tasks that the planned software should be able to do (e.g. graph the data), and the qualities and software should have (e.g. ease of use). Other possible answers could be system and technical requirements, constraints, scope, and assumptions. |
||
B2 | Question 2 (2 marks) [4 lines] Explain why it is sometimes necessary to store numbers in a string data type variable. Provide an example of when numbers should be stored as a string, rather than as a numeric data type. If the number contains non-numeric characters or has leading zeroes, it must be stored as a string. e.g. a phone number like (045) 1234 1678 contains parentheses, a leading zero, and spaces - none of which can be stored numerically. Or... The number has a very large number of digits (e.g. Part number 105561241212957286025), making it impossible to encode as a numeral. In general, iIf you're never going to do any calculations with a number, it is best stored as a string.
|
||
B3 | Question 3 (4 marks) An app developer is creating a sports-scoring application for mobile devices that is currently in the design stage. Two of the solution designs are shown below.
a. Identify the type of design tool used for the sports-scoring application. 1 mark [1 line] Screen mockup. As always, don't waste time with empty words such as "The type of design tool is a... " The examiner knows what the question is - you just give an answer. Other design tools, such as object descriptions and pseudocode, could be used to represent different aspects of the solution design. b. Explain how object descriptions and pseudocode represent different aspects of the solution design, in comparison to the design tool identified in part a. 3 marks [5 lines] A mockup designs the appearance of an interface or printout. Object descriptions list the properties of an object, e.g. a text box's name, font colour, width, justification etc. Pseudocode designs the logic of an algorithm and will later be converted into actual code of a real programming language. Who on earth needs a sport scoring app?
|
||
B4 | Question 4 (5 marks) Ananta is the team leader in a software development company that is creating a workflow management tool for a large marketing organisation. The clients are hoping that the new software will be capable of supporting their employees in monitoring the production of high-quality marketing and advertising materials. a. Identify who should participate in the usability test and explain why. 2 marks [3 lines] Actual anticipated end-users are needed - the employees who will be using the tool in their work. They are the target audience, and if the tool does not satisfy their particular needs, it will be unsuitable. To record the results of the usability tests, Ananta is considering two methods of collecting information. b. Identify which option Ananta should use. Justify your answer. 3 marks [6 lines] Method 1 would be cheaper, quicker, and might gather data about more users in a given time. Method 2 would be slower, and more expensive, but it would gather richer (more informative) data. Being able to ask follow-up questions based on users' feedback would let Ananta discover things that she may never have expected or anticipated. The method to choose depends on how much time and money are available, vs data quality desired. I'd go for method 2.
If you are given names in the case study of a question, use the names in your answer to make it clear who you are referring to.
|
||
B5 | Question 5 (5 marks) a. Describe why a risk-management strategy should be applied as part of an organisation’s software development practices. 1 mark [3 lines] Lost or damaged data is expensive and slow to re-create or repair. Deadlines may be missed. Costs can blow out. Contracts may not be fulfilled. Commercial secrets may be disclosed to competitors. Companies may be prosecuted for abuse of data protection laws, e.g. the Privacy Act. The company's public reputation and stock price can suffer.
b. Using the categories provided below, propose a risk-management strategy that could be used during the development of a software application. 3 marks Technique [1 line] Regular, tested, offsite backups Responsibility [1 line] I have literally no idea what this is supposed to mean. "Who is responsible for carrying out the technique"? "Yes, it is indeed a heavy responsibility" ? I call a foul on this question. It is meaningless.
So - to give an answer (for you should never leave an answer blank) Ananta. From the previous question. She's responsible. Or The backupper guy. Timing [2 lines] This, again, is hopelessly uninformative. Scheduled daily incremental backups to the cloud after working hours. Weekly full backups on Saturday night.
It allows recovery of most, if not all of the lost data so normal operations can be resumed quickly. Question B5 is a disaster. No amount of risk management can rescue it.
|
||
B6 | Question 6 (2 marks) [6 lines] Compare how version control is different from backing up a file. Version control is the tracking and management of changes to software code. There are software tools that let teams manage changes to software when there can be several people working on the same shared code and submitting changes independently of each other. Version control allows the reversion of code to a previous state when errors are detected. Backing up a file is simply copying a file to another location and keeping the original. It is a primitive form of version control.
|
||
Section B overall Disappointing, |
Case studyA software-as-a-service (SaaS)* development business currently provides productivity and project-management software to clients. The business has decided to offer translation** and transcription*** services using artificial intelligence (Al). The business is based in Melbourne, and has offices around the world. Ness is the development leader on the project. Her team will predominantly be based in Melbourne although some staff will be working remotely in offices overseas. In her preliminary planning and work on the project, Ness has decided on using an iterative approach, where three complete phases of the problem-solving methodology will take place. Each phase will take place as follows: Phase 1: User profile (including authentication) module She has also drawn a sketch of the intended workflows for the application when it is complete.
Ness wants secure development practices at the forefront of her team’s thinking when they are developing the platform. The following secure development practices will be implemented: * Software-as-a-Service (SaaS) - Application hosted online. Users typically have a subscription to the service and access the application through a web browser, rather than installing the application on their device. • When users sign up to the platform, they provide personal details, including name, email address and billing information (including address). Users are then asked to verify their email address by clicking a link in a confirmation email.
Phase 3: Translation module Due to a delay in the development of the solution, it has been recommended that a third-party translation service be used to ensure that the platform can be released on time. This third-party service will be accessed by the module, using API (application programming interface) requests/calls. END OF INSERT Wow - that's a lot for students to absorb before they can answer the first question. |
||||||||||||||||||||||
Instructions for Section C Please remove the insert from the centre of this book during reading time. Dumb Way to Die in an Exam #1 - save time by ignoring the case study and just jump into answering section C. It has happened. Dumb Way to Die in an Exam #2 - give answers that may apply to other circumstances, but are not relevant to the section C case study. If you're too young to know about Dumb Ways To Die, go here.
|
||||||||||||||||||||||
SECTION C |
||||||||||||||||||||||
Question 1 (4 marks) a. Name the specific development model that Ness’s team will use during the development of this application. 1 mark Spiral. That's all you need to say to get your mark, The Holy Study Design decrees that three models of the problem solving methodology Starting with the last, the waterfall model starts with analysis, finishes analysis, moves to design, finishes design, starts development (including testing, documentation, implementation) and unto the end of evaluation. Like a waterfall, once you finish a step and go over the edge. You can't go back to a previous stage. It's a one-way path down. The spiral model is just a repetitive (iterative) version of the waterfall model. It is the standard procedure for software development: you write software using the Waterfall model, release it as version 1, improve it, release it as version 2, etc. Spiral is just Waterfall with 'rinse and repeat'. The case study description is certainly not Agile. Agile allows developers to return to previous stages of the SDLC before the entire process is finished. e.g. You are halfway through design when you discover that your analysis was incomplete or outdated, so you need to go back and fix the analysis. Or you are busy developing and discover that newly-released technological standards has made your product obsolete so you need to restart design from scratch. b. Complete the diagram to represent the development model that Ness has chosen to use for the development of this application.
I give up. I have absolutely no idea what this questions is asking. What is "the key"? What is expected to be in the "diagram" to represent the spiral SDLC? I would appreciate some advice. I'm cutting my losses and moving on. If you have no clue what a question means, don't waste too much time on it. Move on and get marks elsewhere. You can always come back to it later if you have time.
|
||||||||||||||||||||||
At this point, I am out of energy. If you want this page to continue, please tell me. Otherwise, it seems like a massive waste of time. |
||||||||||||||||||||||
Question 2 (3 marks) Ness has explained her expectations about secure development practices to her team. These expectations are outlined in the case study.
|
||||||||||||||||||||||
Question 3 (2 marks) To ensure that the team can work efficiently and effectively throughout the development of the platform, Ness and her team need to select a naming convention. It will be used by all team members throughout the project when naming variables, functions and other components of their code base. Describe one characteristic that their naming convention should incorporate. Provide an example of what this characteristic would look like when implemented in this solution.
|
||||||||||||||||||||||
Question 4 (4 marks)
|
||||||||||||||||||||||
Question 5 (3 marks) Referring to the context diagram in the case study insert, identify the correct names for the following labels.
|
||||||||||||||||||||||
Question 6 (1 mark) Users will be asked to provide a billing address, including postcode and state (for example, Victoria), when creating a profile on the platform. They will enter which state they are from, and then their postcode. The postcode will then be checked to ensure that it matches the state that was entered. Identify a feature of a user interface that could be used to facilitate effective and efficient entry of the user’s state. Feature
|
||||||||||||||||||||||
Question 7 (5 marks) Ness originally planned to purchase high-quality test data as part of the testing of the user profile and authentication module. Unfortunately, she found that purchasing this data would cost significantly more than she had budgeted for, which would make it almost impossible to finish the project. a. Identify two possible consequences that might arise from this ethical issue. 2 marks b. Suggest a possible method of resolving one of the consequences identified in part a. and describe an advantage and a disadvantage of taking this approach. 3 marks Method Advantage. Disadvantage |
||||||||||||||||||||||
Question 8 (4 marks) As part of the security testing for the platform, admin ’ OR ‘1 ’= ‘1 is entered into the username field on the ‘user log in’ section of the platform.
|
||||||||||||||||||||||
Question 9 (3 marks) Ness’s team has developed some designs for the transcription module’s interface (Figure 3 in the case study insert), as well as three evaluation criteria that will be used to evaluate the designs they have come up with (Figure 4 in the case study insert). Use the provided criteria to select a preferred design, Design A or Design B. Justify your choice. Preferred design Justification
|
||||||||||||||||||||||
Question 10 (4 marks) The process for uploading a file for transcription will involve checking that the selected file can be processed by the platform’s artificial intelligence (Al). a. Construct a set of tests to fully test the checking of files uploaded to the platform. 2 marks
b. Explain how the use of an error message when an attempt is made to upload an incompatible file would increase the effectiveness of the user interface of the platform. 2 marks
|
||||||||||||||||||||||
Question 11 (5 marks) George and Regina, two members of the team, are discussing the processing features to use in the development of the transcription module.
|
||||||||||||||||||||||
Question 12 (6 marks) The team knows that the accuracy of transcriptions will be an important non-functional requirement for the platform. This algorithm is outlined below.
Whoops. The writer screwed the pooch in the 'wordLibrary[ ])) line. One too many right-parentheses! Using the information and algorithm provided, complete the data dictionary below.
|
||||||||||||||||||||||
Question 13 (3 marks)
Proposal
Proposal Risk 3: User data could be transferred internationally without their knowledge. Proposal
|
||||||||||||||||||||||
Question 14 (4 marks) The translation module takes the source document and splits it into paragraphs, resulting in an XML file being generated. The module then sends each paragraph to the API (application programming interface) as separate requests/calls, working through each paragraph node in the file. As each paragraph is translated, the API adds the translated data to the end of the original XML file. One of the junior developers recommends using a CSV file to send the data to the API; however, Ness disagrees. a. Justify why it is better to use an XML file in this scenario, rather than a CSV file. 3 marks b. From the options below, circle one factor that would influence the decision to use an XML file when designing the module. 1 mark |
||||||||||||||||||||||
C15 | Question 15 (3 marks) Describe a suitable backup procedure that Ness could use while working on the project. |
|||||||||||||||||||||
C16 | Question 16 (2 marks) As development of the platform is nearing completion, Ness is preparing to review the platform for maintainability, security and legal compliance purposes. Suggest two areas of investigation that Ness could include in reviewing these aspects of the platform. Suggestion 1 Suggestion 2 |
|||||||||||||||||||||
C17 | Question 17 (4 marks) At the conclusion of the development of the translation module, and overall project, Ness will assess the effectiveness of her project plan.
|
|||||||||||||||||||||
END OF QUESTION AND ANSWER BOOK |
||||||||||||||||||||||
A temporary icon repository...
|
Back to the IT Lecture Notes index
Back to the last page you visited
Created 2023-12-07
Last changed: August 3, 2024 2:30 PM
Original Content © Mark Kelly 2023
Images and questions are © Victorian Curriculum
and Assessment Authority.
Reproduced here with permission for educational purposes.
Thanks, VCAA!
VCE DATA © Mark Kelly
Section C summary