Information Processing and ManagementVCAA Exam Post Mortem2003 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Other VCE IT Exam Post Mortems to enjoy IPM / ITA / Informatics / Data Analytics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2023
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Post Mortem Notes This is not a VCAA publication.
I do not speak for the VCAA, the IT examiners, or exam markers. I was not involved in the writing or marking of this examination. Extracts from exams are all Copyright © VCAA, and are used with permission. Use these post mortems at your own risk. I reserve the right to change my mind completely, at short notice, about anything I've said here. Suggestions, discussions and corrections are welcome. Questions look like this. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
SECTION A - Multiple Choice |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1 |
[B]. Reducing the price of unsold chickens is a local, immediate decision. [A] and [C] would be strategic decisions, [D] would be tactical. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2 |
[B]. Transmission Control Protocol (which breaks files into packets, and reassembles packets into files and checks for errors in transmission), together with the Internet Protocol (which guides packets from source to destination) makes up TCP/IP, which control most internet and network communications. ISP is an internet service provider, ADSL and ISDN are data channel technologies. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3 |
[D]. Altering and enhancing images is obviously manipulation, rather than output, validation or acquisition. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4 |
[D]. A flat-bed scanner converts printed documents into electronic files. It digitises analogue information, such as images and text (with OCR) |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5 |
Which of the following design tools shows the process to be followed when producing a solution? [A] - Flowcharts design processes. Storyboards design interrelationships of components, especially related to navigation in slideshows, webpages and multimedia presentations. Hierarchy charts design the structure of components in things like websites and databases. Mockups design the appearance of output screens or pages. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
6 |
As part of upgrading to a new information system a manager decides to have software specially written for the organisation. Writing the new software program occurs in which phase of the System Development Life Cycle. A. design |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7 |
Which one of the following actions would be illegal under the Copyright Amendment (Digital Agenda) Act 2000? A. Citing a quote from a web site in a year 12 research assignment. Since the program was work product copyright was owned by the employer, not the employee. The employee does not own the rights to distribute the intellectual property without permission. Option [B] is a "maybe", depending on the licensing conditions of the software. Since [C] is a certainty, and [B] is iffy, you would NOT choose [B]! |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8 |
An instruction pamphlet for updating data on a new web site should be provided to staff A. before the site is uploaded. A bit of a tricky one. We need to think of the stages of the product development life cycle: analysis, design, development, testing, documentation, implementation, evaluation. It can't be [C] because evaluation happens well after the system is in operation. Can't be [B] because testing precedes documentation. [A] probably comes under the heading of implementation, so it's probably not that, leaving [D] by a process of elimination. Takes a bit of thinking, though. 32% of students mistakenly chose [A] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9 |
A chain of video lending libraries has established a range of goals and objectives. Which of the following sentences contains an information system objective? A. Management wish to increase their market share. Key word 1: SYSTEM. Key word 2: OBJECTIVE. A system goal/objective is what a particular system (not the whole organisation) aims to achieve. An Objective is a shorter term target aimed towards achieving larger goal. [A] is an organisational goal. [B] is more like an organisational objective. [D] is an org goal. That leaves C. 30% of students chose [D]. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10 |
A privately owned organisation has established a shared network drive accessible by all staff. It contains a folder called Images which stores all the photos used for staff ID cards. Which of the following measures would enable the organisation to meet the provisions of the Privacy Amendment (Private Sector) Act 2000? A. using the photos for publicising the company [I wonder why these options did not start with a capital letter and end in a full stop like the other questions where the options did not finish the question stem... hmmm... anyway...] All of the other options reduce privacy! The only logical answer is [C]! |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11 |
Which diagram best represents phased conversion? Gotta be [A]! |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12 |
If the condition 'Sales are greater than or equal to 100' needs to be tested, what would be the best test data? A. 90,95,99 [C] To test properly, you need data that meets the condition, and data that does not meet the condition. [A] and [B] cannot test for "greater than" and [D] can't test for "less than" 41% of students chose [D]! |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
13 |
The impetus for an organisation changing to using telecommuting? [A] - maybe. Could nearly equally be [A] human or [B] economic. Employees could be pushing management to let them work at home for the sake of their families etc. Equally possible, management can reduce costs by having some employees work at home - smaller buildings are needed, fewer parking spots need be provided etc. I would accept [A] or [B] but would lean towards [A] as the stronger possibility. The examiners said the answer is B. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
14 |
A firm aims to improve the efficiency of electronically processing application forms. This would be an example of ... A. A legal objective Won't be [A] - there's no legal compliance involved. It's not an organisational goal because it does not affect the direction of the entire organisation. That leaves [C] (info system goal) and [D] (info system objective) to choose from. A goal is a larger ambition than an objective, which is a sort of "sub-goal" aiming to achieve the goal. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
15 |
Daily temperatures are shown in a graph The structure of the information would be [A] detailed rather than [B] annotated, [C] aggregated or [D] summarised. Look at the graph - it shows data for each day of the week - it is not summarised (e.g. totalled, averaged). Unfortunately, this was the hardest question of all the multiple choices, according to students' responses. Only 21% got it right. Most of them chose 'summarised' [D]. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
16 |
You're asked whether Task D is a predecessor for tasks... E&F, B&C, C&F or B&E. Well, since there are no traditional dependency arrows shown, you have to assume that a task that does not start on day 1 must be dependent on some other task. So, which tasks are dependent on task D (so task D is a predecessor to the tasks)? Remember: a predecessor comes before a task that is dependent on it! Which tasks start as soon as task D has finished? E and F. So the answer is [A]. Pretty easy if you know what "predecessor" means. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
17 |
When saving a template file for producing a weekly calendar of events, choose the best folder and filename... A. \Weekly\events [D] is the most descriptive, though I personally would never use a space in a file name! |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
18 |
The most significant constraint on a suburban video store's ability to increase transactions would be having only one... It's got to be [B] barcode reader, which inputs data. The colour printer, flat-bed scanner and user manuals are not involved in transactions. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
19 |
If a survey showed all users understood where to enter responses, the solution attribute tested by the survey would be... [B] usability It's the ability and ease with which users can use the solution. Layout relates to its appearance (which could aid or hinder usability). Accuracy relates to the quality of the output, not input. Functionality relates to what jobs the solution can handle. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
20 |
Which criterion would evaluate the effectiveness of file management procedures? It's clearly [D] a reduction in the difficulty of retrieving a file. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The VCAA summary of how many students chose each multiple choice answerCorrect answers are in bold.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GENERAL COMMENTS FROM THE EXAMINERS Adapted from the 2003 Examiners' Report
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1 |
1. An advertising agency produces high quality A3 and A4 posters using high-resolution graphics to communicate their message. Give 2 reasons why a black and white A4 InkJet printer is unsuitable. Not too hard. Firstly, A4 printers can't handle A3 paper - and sticking A4 pages together is not satisfactory. Secondly, advertising usually relies heavily on colour, which the black and white inkjet can't manage. Read the clues in the question! The Examiners said: A lengthy response was not required. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2 |
2. Many IT experts believe that 'to be useful, information must be relevant'. Describe what is meant by relevant and provide one example of relevant information. 'Relevant' means that the information has value to the audience in that it provides the information the audience needs or wants. An example of relevant information would be ticket prices on a concert poster, a phone number in a newspaper ad, conditions of entry in a competition announcement, ingredients on a food product package, instructions on how to install a product. There are thousands of other relevant examples. The examiners said: Some students found it quite difficult to define relevance without using the word relevant and frequently did not read the question, which asked for one example of relevant information. A large number of students gave an example of irrelevant information. It was expected that the description would say that the information should be meaningful to the person receiving it. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3 |
3. Identify two conventions used in formatting this numeric data...
The examiners said: The question asked students to identify, so detailed explanations were not required but the convention had to relate to
the numeric data. A number of students did not appear to understand the word convention or relate their response to the
numeric data. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4 |
4. Explain the role of a 48x speed CD-ROM and describe one capability and one limitation of the drive. A CD-ROM drive reads the data on of CD-ROM disks. A capability is to access CD data randomly at high speed and transfer data at high speed to the system. A limitation is that it cannot read DVDs, it cannot read at a speed faster than 48x, it is relatively slow compared to a hard disk drive, it cannot write data. Most students were able to explain the role of the CD-ROM and give a limitation but very few were able to describe a
capability. Many students simply repeated the role of the drive as its capability rather than describing how well it
performs its function. The expected responses were: |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5 |
5. A new company specialises in providing tips and tricks for customers who purchase their computer games. Manager Mr Fedora, wants to set up a web site with a 'Members Only' area. a. State one method of identifying members that Mr Fedora could use on his web site and describe how it would apply. Mr Fedora would need to password protect the members-only directory on the web server, and set up database of authorised user names with matching passwords. When a person tries to access any page in the password-protected directory, the web server would bring up a login box. The person would need to enter a valid user name and password to access any of the protected members-only information. The two most common responses were:
Mr Fedora plans to include in the Members Only area a list of all members, their email addresses and the games they have purchased. This data is taken from the warranty cards lodged with the company. b. Discuss, in the context of current legislation, one concern you would have regarding Mr Fedora's plans. The National Privacy Principles, embedded in the Privacy Amendment (Private Sector) Act 2000, forbid the use of data (such as email addresses, purchases etc) for a purpose other than that for which the data was collected (e.g. warranty registration). Mr Fedora must not use members' private information from the warranty cards on the website unless the people have given permission for him to use this information for a different purpose. Students were required to discuss ONE concern. To obtain full marks students were required to relate their concern to the privacy legislation. Many students only answered half the question, focusing either on the concern and not on how this connected to the legislation or focusing on what the legislation states without indicating how Mr Fedora might be causing problems. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
6 |
6. Using either a spreadsheet or a database example, describe one electronic technique used to validate input data. Illustrate your answer with an example of a data item that might be rejected. Spreadsheet... In Excel 98 and after, validation rules can be used to detect and report invalid data. For example, a cell meant to contain a person's age may be told to reject negative numbers or text input. Another validation technique is to use a formula that monitors the contents of another cell and notifies the user if certain conditions arise. e.g. If a person's account balance falls below zero, a formula in a neighbouring cell could warn that the person is in debt e.g. =IF(BALANCE<0, "Person is in debt!","") Database... Databases allow validation rules to be attached to data fields. Fields can be limited to a range of values (e.g. 0-100), or values from a list (e.g. states of Australia). The type of data can also be checked (e.g. text, numeric). Values can be forced to be unique (e.g. user names), or of certain length (e.g. Australian business numbers, credit card numbers.) Students found this question difficult and often listed a validation technique rather than describing it and either did not provide an item that would be rejected by the technique or provided an item that would be accepted by the technique. It is essential that students read questions carefully to ensure they answer the question that is being asked. Regardless of whether the student selected spreadsheet or database, the most common responses by students were to use a range check or limit the data type that could be entered into a cell or field. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7 |
7. Classify each of the decisions below as one of the following types: operational (o), tactical (t), strategic (s) i. A customer is given an extra discount on damaged stock OPERATIONAL. Some might say "tactical", I guess, but it's not a big decision. If the store policy were changed to allow this extra discount, that may be be tactical decision in the pursuit of better customer satisfaction. ii. A company decides to close two of their smaller branches TACTICAL. Arguably "strategic" if the company had very few branches and closing 2 would be a major cut. If they were multinational, closing 2 small stores would be a "middle manager" strategy to save money. I disagree with the official answer (below) iii. A receptionist orders a different brand of photocopy paper OPERATIONAL. No argument about that one. These could be debated. Really, sometimes I feel such decisions will depend on the size of the organisation. In an owner-operated shop, case (i) might be considered a decision that is a bit more than a run-of-the-mill daily choice. In case (ii) if the company is a small one with only a few branches, closing 2 branches would be a BIG strategic decision for them; for an international industrial juggernaut, closing 2 branches would be a minor tactical decision. The rule of thumb is that operational decisions are those made in the course of day-to-day business. They do not involve medium or long-term planning. Tactical decisions are those with a medium-length timeframe - weeks or months - and usually are aimed at implementing a strategic decision. The top-level strategic decisions affect the long-term direction and purposes of the entire organisation. They are long-term - months to years - often expensive, and can greatly influence an organisation's successes for the better or worse. Generally, students wanted to allocate all of the options over the three statements [i.e. they felt O, S, and T all had to be used]. As a result only a small percentage of students obtained full marks for this question, as the most common response was 'O, S, T.' The actual answer was: (O) perational, (S) trategic, (O) perational. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8 |
8. The cartoon above shows a thief attempting to steal data/information from a network. The question is WHY? The cartoon is completely pointless and adds no useful information. What on earth were the examiners thinking? One possible way to prevent this is to install a firewall. a. Describe how a firewall works A firewall is a hardware or software device that monitors the 65,536 internet ports that are opened when a computer connects to the internet. Most of these ports are unused, but others serve as vital communication channels (e.g. port 80 is for web pages, 21 is for FTP.) Hackers can gain access to a networked computer by sniffing or probing for open internet ports and use software to install Trojan Horses or similar tools onto a vulnerable system. These tools can later be used to control the PC (e.g. participating in a distributed denial of service attack) or steal information from it. The firewall monitors incoming and outgoing activity on internet ports and only permits authorised programs to communicate with the internet. It also "hides" the unused internet ports so any external port probe gets no response : as far as the hacker can tell, the PC does not exist. Students knew in general what a firewall was although many of them had difficulty in describing how it worked. b. Describe one limitation of using a firewall Well, I can't think of any significant ones.
Student responses to this question were quite varied and it was often left unanswered. The most common responses,
however, focused on the: Another strategy that can be used to protect data is encryption. c. Select the email that is most likely to be encrypted and justify why it is more likely to be encrypted that either of the other two choices. i. an email message confirming a date and time
for a meeting. Obviously email (iii) is the one containing the most secret and valuable information, and should be encrypted. Email (ii) probably will not contain any information that could be used against someone. Email (i) is most likely useless to anyone but the recipient, unless the very fact that two people were meeting was significant (e.g. an employee meeting with the personnel manager of a rival company.) It was expected that students would explain why option three was more likely to be encrypted than both option two and option one. Teachers should be aware that the examiners expect in the future that if a student is given two or more options and asked to justify their choice, students must relate their justification to the options provided. In this question students commonly misread option two as containing personal bank account details rather than requesting them. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9 |
9. Label only those sections of the diagram below that are needed to show the path to each of the following files. File 1: Test1.bmd is stored in C:\data\users\teacher\smith File 2: c:\data\users\student1\outcome1.xls File 3: c:\programs\office\word\word.exe File 4: Answers.txt is stored in c:\programs\notepad Pretty easy, if you know directory structures. Actually this question was kind of fun to do :-) Generally, students handled this question well. The most common error was to assume that all sections of the diagram needed to have entries and a small number of students placed files in the users folder. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10 |
10. Springfield Lending Library opens Monday to Friday from 9am to 5pm. The file server stores all the programs for the library - an operating system and a library program called 'Borrow All'. Borrow All generates a loans data file which records all items out on loan. Currently there is no back-up even though a tape back-up unit has been purchased. a. A computer technician makes the following 3 recommendations about possible backup procedures. For each recommendation explain one concern you would have if it was implemented. Recommendation 1 - two tapes to be purchased and rotated Concern: Backups would be overwritten too soon - after two days, backup information is lost. If data loss were discovered more than two days later, the backed up copy would already have been overwritten! Two tapes are not sufficient because: Recommendation 2 - all programs files be backed up daily Concern: Backing up program files rather than data is a waste of time. If the program files were somehow destroyed, they could easily be reinstalled from the original CDs or disks. It's the data that are irreplaceable! • program files do not change frequently and so do not need to be backed up daily Recommendation - backups should be done at 9am Concern: Backups should be done when the network is usually idle - usually at midnight. One reason is that any files that are open and being used cannot be backed up. Another reason is that backups can consume considerable resources on a server - and will slow down network operations for users. 9 am is an inappropriate time to complete a back-up because: In general, students found this question quite difficult. It was clear that students did not think the recommendations were appropriate, but they found it hard to explain the concern if the recommendation was implemented. b. Recommend an appropriate backup strategy. Your strategy should cover
In general, students could recommend appropriate strategies; however, there were weaknesses in many responses. Firstly, students did not address the five areas listed in the question and secondly, their description of a back-up strategy was inappropriate for the organisation described. For example, a small number of students recommended backing up every time a book was borrowed or returned or every ten to 15 minutes. The expected response was:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11 |
11.
a. What type of network is described in the above article? A WAN (Wide Area Network) Students either knew this or tried to reply with a type of network topology (e.g. star). Accepted answers were WAN or Wide Area or Wide Area Network. b. Explain what is meant by 'bandwidth limitations' by referring to the article. Bandwidth is a measure of the amount of data that can be transmitted in a given time. Because the Schools of the Air will be transmitting video as well as data, they do not have sufficient data-transfer capacity to support two-way video data exchange, so students can only see the teacher and not vice versa. Students could not describe bandwidth limitations and in general found it difficult to relate to the case study, other than
quoting the article. At Year 12 it is expected that students will be able to explain in their own words and not just write
down the exact phrase that appears in the article. The examiners expected students to respond as indicated below. Reference to the article: c. In the future 'on an outback station, a student communicates in real-time with the teacher and other students via a web cam attached to the PC. Email replaces the slow and unreliable postal service.' Discuss two benefits of upgrading to a real-time system with email facilities for students. Teachers will be able to conduct classes involving visual aspects rather than only tasks that can be done by speech (e.g. art, drama). The teacher will be able to immediately see a student's performance and offer immediate feedback. The important human connection needed in teaching will be reinforced by students and teachers being able able to see each other's body language and facial expressions. Email will allow the instant sharing of documents with teachers and other students. The documents could contain text, pictures, even music and multimedia work. The teacher will be able to assess students far more quickly, and will be easily able to edit student work and return it immediately. Benefits were required to relate to either real-time or email and most students picked up on this requirement. Lower order responses tended to list the benefit rather
than discuss it. The most common responses related to the following benefits. Once the network with the web cam has been fully implemented, students will be surveyed about the success of the change. d. Prepare 2 questions for inclusion in the survey. The first question must focus on identifying any improvements in the efficiency of the network. The second question must focus on the effectiveness of the new network. Efficiency
The proposed questions in the survey needed to be specific and not general, e.g. 'Is it more efficient?' Students found it
difficult to frame a question and often reversed the efficiency and effectiveness responses. Effectiveness
Just remember that efficiency deals with saving time, money and effort. Effectiveness relates to the quality of the finished product (e.g. accuracy, clarity of output) This question must relate to effectiveness (improved process/product/output) |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12 |
12. Fleur's Florist is a very successful chain of florist shops specialising in parties and weddings throughout Victoria. They are about to open new stores in Sydney and Brisbane and are keen to promote their stores in these two states. a. Outline two reasons why the manager might suggest a web site would best suit the intended customers.
Most students were able to outline two reasons why the manager would suggest a website, although lower marks were
awarded to students who repeated the same reason in slightly different words or talked about promoting the store to
overseas clients, which was clearly not part of the scenario. The most common reasons were: b. Outline one reason why the manager would request a screen layout mockup as a design representation before approving the website. The appearance of a website has a big impact on its success. Ugly or hard-to-read screens will deter or confuse visitors. The manager would want to see that:
Students generally handled this well, although it was clear that a small number of students did not know what a screen
layout mock-up represented. Accepted reasons included: The solution attribute of functionality needs to be tested. c. State two tests that would test the solution's functionality and explain how you would conduct each test. Test 1 Testing that links to other pages or sites work Explanation Click each link on each page and see whether the appropriate destination is reached. Test 2 Testing that images, animations and alternative text appear as expected Explanation View the page using different versions of different browsers (e.g. Netscape 4,6, IE 4,5,6, Opera, Safari on a Mac, Netscape running on Linux), different screen resolutions (e.g. 640x480, 800x600, 1024 x 976) to check that images appear properly, alt text is correct, animations play with each browser type and version. If problems arise with a particular plugin, browser type or version of browser, an attempt should be made to provide the same information in an alternative manner (e.g. graphics links need text equivalents, framed sites need a 'frameless' version). Javascript should be thoroughly tested for correct results, and consideration given to users who lack JS - no essential page functions should be available only through JS, Java or exotic plugins (e.g. Flash) - some 'plain vanilla' alternative method should be offered (e.g. you should not support feedback or contact only through forms - provide an email address that people can use if their browser does not handle forms properly.) Students found it difficult to identify a test that related to functionality and the term was clearly unfamiliar to a large number. Students commonly responded with surveys, which showed customer satisfaction rather than testing functionality. Those students who were able to identify a test that related to functionality of the solution still had difficulty explaining how the test would be conducted.
d. Identify a sample group of people who could be used to test the solution. Justify your choice. Sample group Volunteer customers may be invited to test the site. Justification Solutions should be tested by typical members of the target audience. By selecting existing customers, you should get a reasonable cross-section of the total population of potential users. It is important to use typical people rather than IT specialists - specialists are not likely to suffer the same sorts of mistakes, confusion and misunderstandings that a typical site visitor would suffer. In general, students selected an appropriate sample group but the lower responses showed little evidence of being able to justify the choice made. e. Two possible criteria for evaluating the effectiveness of the web site would be i. number of hits ii. number of online orders placed by email has increased Select the criterion you would recommend and justify your choice. Criterion ii actually measures sales, and hence profit, which is the primary organisational goal. Large numbers of visitors who don't buy anything is a waste of time, effort and money for the organisation. It was noticeable that students had difficulty justifying their choice. The expected response was option two. Accepted justifications included: |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
13 |
13. Cheapway Supermarkets is planning to introduce a self-scanning system into its supermarkets. Instead of checkout attendants, customers will take their items to a self-scanning terminal. Customers will scan each item and press a button. After all items have been scanned the terminal will print a docket, which will be taken to the cashier for payment. There will be one cashier for every four terminals. a. Identify and explain one health and safety requirement that will need to be considered when customers use this new system. Health and safety requirement Hmmm - this is a dicey one. There's not a lot of interest or importance to say...
Students who could identify a concern were usually able to explain why this was. A number listed concerns that had no relevance to the case study or the tasks being undertaken by the customers, and a small number provided no response to this question. This was because it was a BAD QUESTION! Don't blame students for being unable to answer a question that has no clear answer. Explanation You don't want customers crippled, blinded, electrocuted, irradiated or blown to bits? Not a really good question, I'm afraid. It does not cover much of significance.
The first set of four terminals will be installed in the city store three months before installation in other stores. b. Identify the changeover method. Note: implementation methods are no longer part of the study design. (2011-2014) Pilot. Management thinks that self-scanning terminals will reduce company costs. c. Using one example, discuss why this may not occur.
In general, students handled this question appropriately and indicated why costs might not be reduced. However, the
common error was to focus on reduced income from loss of customers rather than look at company costs as indicated in
the question. Some of the more common responses were: The diagram below represents some of the tasks to be completed to install the terminals in the city store. Note: PERT and Gantt are no longer part of the study design (2011-2014) d. i. Mark the critical path This question was poorly done and students frequently omitted to mark the critical path or marked the whole diagram. Students either knew the term and its meaning or were clearly guessing. OTHER POINTS OF VIEW - from Antony We see the critical path as 5 days only as part d (ii) tells us that the project finished before the opening celebrations began. Note that this little gem of information is given to students after they have just used their thick black texta. It's an iffy one. My philosophy is that if it's in the PERT, it must be part of the project. If not, why is it there? PERTs describe projects :-) I'd be upset if examiners expected kids to ignore the end of the PERT! ii. Explain why the supermarket has allowed a week between the completion of the project and the opening celebrations. 'Bedding-down' time? Allows the staff to become
familiar and comfortable with the new system. Most students could explain contingency planning and the only common error was to indicate that one of the tasks in the original diagram was going to occur during the week (e.g. training of the cashier). The two most common responses were: e. List two groups of people who will need to be trained to use the new system and explain the type of training you would recommend for each group. Managers - need to gain an overview of the whole system so they understand its operation and the roles of people who use it. Small-group training would be suitable. Customers - need to know how to carry out scanning and make payment, how to cope with common problems (e.g. items that won't scan). Public advertising can demonstrate how to use the new system. One-on-one training of customers by staff could be used for customers who have trouble with the system. Cashiers / Staff - need to know how to fix common problems (e.g. items that won't scan, dirty scanners, incompetent customers), need to be able to spot customers who are 'cheating' by deliberately not scanning all items. For the pilot installation, small-group training would be best. For full roll-out to all stores, a train-the-trainer program might be most effective and efficient. Technicians - may need to be trained in the workings of the new equipment so they can repair or upgrade it when necessary. Since there are few technicians, small-group training supported by comprehensive documentation would be best. All training would be carried out on-site, preferably outside normal working hours (with some form of compensation given to staff for giving up their personal time). In this question the better students had the opportunity to demonstrate their knowledge and the question produced an effective spread of marks. Weaker students were able to identify appropriate groups but in general were unable to come up with appropriate types of training. Better responses provided detailed strategies for each user group. Many students only indicated some of the content of the training, rather than giving a detailed response. The most common responses were:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
All in all - a fair and pretty easy exam.And guess what - the PERT chart question had no problems this year!Woohoo! |
Back to the last page you visited
Created November 11, 2003
Last changed: March 9, 2022 11:34 AM
Original Content © Mark Kelly 2003
VCE Applied Computing Notes © Mark Kelly 2001-