Information SystemsVCAA Exam Post Mortem2006 |
||||||||||||||||||||||||
Post Mortem Notes This is not a VCAA publication.
I do not speak for the VCAA, the IT examiners, or exam markers. I was not involved in the writing or marking of this examination. Extracts from exams are all Copyright © VCAA, and are used with permission. Use these post mortems at your own risk. I reserve the right to change my mind completely, at short notice, about anything I've said here. Suggestions, discussions and corrections are welcome. Questions look like this. |
||||||||||||||||||||||||
Other VCE IT Exam Post Mortems to enjoy IPM / ITA / Informatics / Data Analytics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016
|
||||||||||||||||||||||||
Since I'll be teaching Software Development in 2007 I thought I'd have a look at the 2006 IS exam. Hereunder please find a brief account of what some answers may look like. Please take this with a grain of salt since I have never taught IS and am relying on many years of amateur programming and teaching IPM. | ||||||||||||||||||||||||
Section A |
||||||||||||||||||||||||
A1. A cinema uses a network of computers for selling tickets from day to day. What type of information system is the cinema using (1 mark) Transaction Processing System.
|
||||||||||||||||||||||||
A2. a. State the topology of the network above. (1) Star. b. State the type of network used above (1). I don't like the ambiguous wording of this: there are several ways of categorising a network. Students could say "LAN" or "Client/server". As a guess, I'd put down Local Area Network and trust the examiners will be magnanimous enough to accept either answer.
|
||||||||||||||||||||||||
A3. Describe the major difference between the functions of a switch and a modem in a network. (1) A switch is a device to interconnect network nodes so that devices can exchange data. They are commonly used to split one cable into many cables, like an electrical powerboard. Unlike hubs, switches are smart and only pass on traffic to devices that the traffic is intended for. A modem on the other hand is the device that connects a computer to the outside world, usually the internet. Strictly speaking, a modem is an analogue device that modulates digital data into sound so it can upload over phone lines and demodulate downloads of sound back into digital data. (Get it? MODulateDEModulate?) There is no way any modern network of any importance would use a real analogue modem - at a theoretical maximum download speed of 56kbps (and upload at 33.6kbps) it is far too slow, prone to data error and line dropouts, and it monopolises a phone line. A cable "modem" just splits internet data from cable TV data. It does not modulate/demodulate and is purely digital.
|
||||||||||||||||||||||||
A4. A network operating system provides services to network administrators and users. State two important services you would expect to be provided: one for the administrator and one for the user. (2)
|
||||||||||||||||||||||||
A5 - Link each of these scenarios with one of the following states of the systems development life cycle: analysis, design, development, implementation, evaluation
|
||||||||||||||||||||||||
A6 - A company, No Blots, supplies ink cartridges for printers which are sold only through the internet. When customers place an order, the order is checked, a confirmation is sent back to the customer and the details of the order are sent to the warehouse. The diagram below shows the data flow diagram (DFD) for the No Blots online purchasing system. The diagram does not show the data sources and destinations. a. In a DFD a circle represents a process. Briefly explain what is meant by a process. (1) A process is some form of processing which take data as input, does something to it, and provides outputs b. In the DFD, what do the symbols labelled stock and orders represent? (1) They are data stores, including electronic stores such as databases, and physical stores such as filing cabinets or stacks of paper. c. Complete the context diagram below for the No Blots system. (3)
Now, this is my first DFD so there are no guarantees it's up to scratch. It seems that we need to provide an input to the warehouse from the online purchasing system (OPS). We would also need to add an external entity, the customer, and link the customer to the OPS. I'm only guessing that the warehouse must send some form of invoice or receipt or packing slip to the customer when the goods are shipped. I'd be happy to be instructed on this! Thanks to two wise souls who informed me that flows cannot go directly from one external entity to another - I had an invoice/receipt going from the warehouse to the customer. Such flows need to pass through a process, hence the amended DFD above. As a tip: I used Word's drawing tools (basic shapes, connectors) to draw the DFD. The connector arrows move around when you move connected shapes. Add text to shapes by right-clicking the shape and selecting "Add text". Add text to arrows the hard way with a text box (formatted to have no fill and no lines).
|
||||||||||||||||||||||||
A7. A computerised machine sorts fruit by weight. It uses a program that directs the fruit through three different gates according to weight. Below is a small segment of that program. message a. Identify each variable shown in the table below as one of the following variable types: text, date, boolean, integer, floating point. (3)
b. The code is to be written as a procedure within a larger program. The programmer decides to name the procedure 'helen' in honour of his girlfriend. Briefly explain whythis is a poor choice of name for the procedure. (1) Well, it gives no clue as to the contents of the procedure. A good name is a short, pithy, informative label that lets you identify the nature of an object without having to open it and inspect its guts. Also, once he and Helen split up acrimoniously, the name will be there forever to haunt him in the future. Question A7 was a bit too easy, I think. |
||||||||||||||||||||||||
A8. Explain the difference between Read Only Memory (ROM) and Random Access Memory (RAM). (2) Once a ROM's contents are written it, they cannot be changed. On the other hand, they survive with no electricity. RAM is volatile and loses its contents continuously, thereby requiring refreshing many times a second (unless it's expensive static RAM). RAM loses its contents when the power goes off. ROM is used to store permanent programming (such as controllers of toasters and microwaves). RAM is used to store program code that is running, and to store temporary ('scratch') calculations. Intermediary forms between ROM and RAM are PROM, EPROM, EEPROM and Flash memory whose contents can be rewritten. Actually, I've been wanting to make a nerdy point for a long time: ROM is also random access, so they really should be called RORAM and RWRAM.
|
||||||||||||||||||||||||
A9. Describe how a router can help make a large network run more efficiently. (2) Notice it said "efficiently", not "effectively", so we're concerned with saving time, money and labour: we are NOT interested in quality, accuracy, safety etc. I hope the examiners notice this too! Routers have 3 functions: 1) they can be programmed to protect a LAN from undesirable incoming traffic, and can kill unwanted outgoing traffic. 2) they can divide a LAN into discrete sections with different privileges. For example in a school the teachers' admin network is logically separated from the students' curriculum network by the router. Staff can see the student network, but students are prevented from seeing the admin network by the smart router. While it seems there are two separate networks, they are in fact one. 3) they guide TCP/IP packets from their source to their destination across LANs and the internet. Routers come in all sizes from paperback-sized home router boxes to room-sized supercomputers used by telcom giants like Telstra and AT&T. Now, how can they make a "large network run more efficiently"? Saving time: they prevent unwanted incoming packets that would have to be dealt with by the LAN. They help prevent hackers entering a LAN, thereby saving time having to be spent recovering from data destruction or theft. Routers direct packets efficiently to their destination, thereby saving users time waiting for uploads and downloads to finish. Saving money: data loss by intruders can be hideously expensive. Re-creating lost data is massively expensive and disruptive. Saving effort: since the router protects the LAN from hackers, less effort is required to maintain it. Dividing the LAN into discrete sections with a router can make one group of users (e.g. the payroll department) invisible to other users (e.g. greedy sales staff) so less work needs to be done enforcing network security. Yeah - stretching a long bow, I know. Not terribly convincing, but that's what the question asked. To quote the OFFICIAL IT study design glossary (Page 48)... EFFECTIVENESS = A measure of how well something works, such as an information system, file management strategies and an information product, and the extent to which it achieves its intended results. Measures of an effective information system include reliability and maintainability. Measures of an effective information product include completeness, readability, attractiveness, clarity, accuracy, accessibility, timeliness, communication of message, relevance and usability. Measures of an effective file management strategy include integrity of data, security, ease of retrieval and currency of files. EFFICIENCY = A measure of how little time, cost and/or effort is wasted in order to achieve intended results. Measures of an efficient information system include its productivity, processing time, operational costs and level of automation. Measures of an efficient information product include the speed of processing, the functionality of the solution, the ease of use of the solution and output and the cost of information processing.
|
||||||||||||||||||||||||
A10. A company requires a particular task to be carried out using a computer. It has a choice of two programs, A and B. The company would like to evaluate both programs so that it can decide which to purchase. Several criteria can be used to evaluate software, including effectiveness, efficiency, maintainability, reliability, usability. The company will perform three trials, each trial measuring a different criterion. The trials are shown in the table below. For each trial, state which if the criteria listed above is being measured.
|
||||||||||||||||||||||||
Section B |
||||||||||||||||||||||||
CASE STUDY INSERT |
||||||||||||||||||||||||
Lucy’s current system So she can grow the best orchids, Lucy has to have different growing conditions at different stages of a plant’s life. For example, her seedlings and younger plants require less light, a higher temperature and higher humidity than older plants. To achieve this, Lucy has divided the greenhouse into three rooms. Each room has its own set of climate control units as shown in Figure 1 on the following page. They can be set according to the needs of the plants in that room. For example, for Lucy’s flowering plants • if the light exceeds 15 000 lux (a measure of light brightness), shade curtains are automatically pulled across
the roof Each unit operates independently and automatically although sometimes one will fail. This can have serious consequences for Lucy’s plants and she can only check each unit by going into the greenhouse and reading various climate gauges in the greenhouse. For example, if heaters fail at night she will not know until the morning when she physically checks the thermometer. Cool overnight temperatures will cause her plants to grow more slowly or even kill them. Failure to control light or humidity may also cause damage. Unfortunately, Lucy cannot be in the nursery every day because of personal and business commitments. With the current system, Lucy can grow plants from seedling to flowering in 2.5 years. On a recent trip to Holland, to purchase new varieties of plants, she noted that Dutch nurseries were growing plants from seedling to flowering in 1.5 to 2 years. The reason for this is that the climate in their greenhouses is computer controlled. All the sensors and climate control devices are connected to a computer. A computer program then maintains ideal growing conditions. For example, if the temperature gets too high, shade curtains are activated regardless of the light level, and in extreme conditions, mist sprayers are also turned on, even if humidity is above 80%. Lucy’s new system Lucy recently purchased a new nursery five kilometres from her house. It has unheated greenhouses covering 3000 square metres of land. Because her new greenhouses will have to be upgraded for her orchids, Lucy decides that she wants to introduce a computer controlled climate system into both her existing local nursery and her new remote nursery. She would like this computer climate control system to Lucy imagines that the new system will be something like that shown in Figures 2 and 3.
|
||||||||||||||||||||||||
|
||||||||||||||||||||||||
1. Lucy has decided she needs some help to introduce her new computer climate control system for her greenhouses. She employs a system analyst, Susan, and outlines her current system and what she would like to achieve with the new system. Question 1 Susan asks Lucy for technical information about the sensors used in her current system, but Lucy cannot help her. a. Identify a primary source from which Susan can obtain more information about the sensors. The sensor manufacturer. Susan could search their website or contact them by phone or email. b. State two examples of the technical information Susan can expect to obtain from the primary source. Power requirements, wiring configurations, interface requirements, expansion methods, how to adjust settings, software requirements, care and maintenance, common faults and fixes.
|
||||||||||||||||||||||||
Question 2 Lucy describes the temperature control to Susan. The temperature in a greenhouse room is constantly monitored and if it falls below 19°C a heater is turned on. If the temperature rises above 21°C the heater is turned off. When the temperature goes over 25°C vents are opened to allow fresh air into the room and if it gets hotter than 29°C evaporative cooling is turned on. Once the temperature drops below 24°C vents are closed and cooling stops. Susan finds this description confusing so she documents this process with a Nassi-Shneiderman (NS)
diagram.
|
||||||||||||||||||||||||
Question 3 Lucy has seen that the Dutch system, as discussed in the case study, is robust and reliable. She would like to combine parts of this system with her current system but feels further investigation is required. By referring to Lucy’s current system, describe two further factors about the Dutch equipment that Lucy will need to investigate. Explain why each of these factors needs investigation. The table filled most of the page.
Remember that "equipment" includes hardware and software - in IPM at least!
|
||||||||||||||||||||||||
Question 4 Susan has discovered a shareware program on the Internet that appears to suit Lucy’s needs. The program
uses a number of standard interface screens that will allow Lucy to make adjustments to the conditions in the
greenhouses. Other screens are used to alert Lucy to problems in the greenhouses. Lucy thinks that this screen has a major design fault. a. Identify this fault.1 mark The data entry fields are not adequately labelled - one has to assume the left hand fields are minima and the right hand fields are maxima. And what units are the values to use (e.g. Celsius or Fahrenheit)? b. Suggest how the fault can be corrected.1 mark Adding helpful labelling, e.g. "Min" and "Max" labels above the columns of fields. Units specified e.g. "Light (lux)", "Temperature (Celsius)"
The following screen is used to alert Lucy to problems with the growing conditions in the greenhouses. Lucy thinks that this screen also has a major design fault. c. Identify this fault.1 mark The alert does not specify what greenhouse room is affected, or when the alert happened. It also does not say how severe the problem is and therefore how urgently the problem needs to be attended to. d. Suggest how the fault can be corrected. 1 mark "URGENT ALERT
|
||||||||||||||||||||||||
Question 5 Lucy has decided against the shareware program and buys the Dutch software. After installing it, her friend Peter, who is a programmer, is convinced that the Dutch software has some major faults. He has offered to fix these problems for Lucy, free of charge. Explain the legal obligations and/or ethical considerations that Lucy should think about before she accepts or rejects Peter’s offer to alter the program code. 4 marks The first obligation is copyright. Assuming the software is a compiled executable (and not interpreted from source code), it would need to be decompiled or reverse-engineered to modify it, and most EULAs (End User Licence Agreements) forbid such actions. Lucy would need to ascertain that the licence agreement authorised customers to modify their software. I found this question a little unrealistic. The examiners seem to be fishing for a discussion of copyright and licence agreements, but in the real world Lucy would not have the source code, and modifying compiled code is a not as easy as looks.
|
||||||||||||||||||||||||
After checking carefully Lucy is satisfied that she can allow Peter to fix problems and make any changes that he would like. Question 6 Lucy wants to receive an alert message if the humidity drops below 20% or rises above 80%. Peter writes a program module to do this and tests it with the following test data.
a. Susan is not satisfied that this data has fully tested the program module. Explain why. 2 marks "Below 20%" is tested, and an in-range value is tested, but "over 80%" is not tested. Peter has failed to fully test the boundary condition. Remember there's a big difference between = and >= and <= . Logical errors like this around boundary conditions are very common and hard to debug. b. Explain exactly what Peter needs to do to satisfy Susan’s concerns. 2 marks Add "81%" as the fourth piece of test data. To be complete, you'd also want to add a test for "20%" to be sure all boundary conditions have been exhaustively tested. Gee - two marks for that? Rather simple, IMHO.
|
||||||||||||||||||||||||
Question 7
One of the errors that Peter has found is in the code to control the shade curtain motor. Begin
End a. Below is a testing table. Work out the action that the algorithm finally produces and complete the last column.
4 marks *13 Nov 06 - my original answer to the second test case was "Close" based on the action of the first IF statement. Thanks to clever Hon for correcting me on it: it should be "Open". I wonder if the examiners noticed that too. If you look at the algorithm, the t=34 triggers the first IF statement (which closes the curtain). But then in the second IF statement the L=5000 triggers the curtain opening. So the curtain closes, then opens, so the algorithm finally produces an OPEN status - which is what the question asked. Ooops! Also, in test case 4 the curtain also does an unnecessary closure before (erroneously) opening. b. A line in the algorithm contains a logic error. Identify that line by writing it out in full. 1 mark If Temperature < MinTemp Or Light < MinLight Then c. Describe how this error can be corrected. 1 mark Change it to If Temperature < MinTemp AND Light < MinLight Then Fortunately this patch fixes both of the cases of algorithm misbehaviour!
|
||||||||||||||||||||||||
Question 8 The new system requires a computer in each nursery to control the greenhouse climates. The orchids may be damaged if these computers fail to work. Each computer will be placed in a small enclosed area as shown in Figure 3 of the case study.
a. List three separate hazards to which these computers will be exposed. 3 marks Also direct sunlight could be a problem over time. b. Select one hazard and describe why this is a concern for Lucy. 2 marks Excessive humidity can damage electronic components and possibly cause short circuits. Direct contact with water will, of course short circuit the electronics and excessive heat will reduce the computer's lifespan. UV will damage the computer's case. c. Describe how Lucy should protect the computers from the hazard described in part b. 2 marks Fit a refrigerated air conditioner in the room to control heat and humidity. Put curtains over any windows in the room. Don't put sprinklers in the computer room!
|
||||||||||||||||||||||||
Question 9 Lucy wishes to connect the computer in the local nursery with a computer in her house so she can monitor the greenhouse from her study. The distance is approximately 30 metres. She has two choices. Option 1: to connect via CAT-5 cable Select the better option for Lucy. Justify your selection by comparing the two options. 2 marks Both options are clearly viable, and I feel a student could argue persuasively for either one: the argument rather than the actual choice will be the important factor. 30m is well within CAT5's 100m range. Wireless will also manage 30m comfortably if there are no significant obstacles in the line of sight. Wireless is also quite reliable and cheap nowadays. The deciding factor for me is the difficulty in threading 30 metres of CAT5 between the house and the greenhouse. Putting it underground would require conduit and digging trenches is a difficult job. It also runs the risk of being cut by careless diggers. If the cable were strung aerially, it would also require protection from UV, and it risks being snagged by tall vehicles. Also, once cable is put in place, it is difficult to move or remove later: wireless is far more flexible. I'd go for the wireless option.
|
||||||||||||||||||||||||
Question 10 Lucy needs to monitor her new remote nursery as described in the case study insert. She needs to connect the nursery computer (five kilometres away) to her home computer. She expects the remote nursery computer to transmit approximately 2 KB of data every five minutes to the home computer. She has a phone service to the remote nursery. She is investigating a number of options for this task. a. What type of network does Lucy want to set up? 1 mark Again, the vague "type of network" problem. I think the question is angling for students to say "WAN". I wonder if kids would get marks for saying Lucy wants to set up a good / reliable / easy to use / happy network?? b. For each of the following three options outline one strength.3 marks
Option 1: Use dial up Internet – get the computer to use the Internet by dialling in every 5 minutes. 1. Dialup - cheap, basic equipment requirements. Quick and easy to set up. Cheap internet plan. 2. Broadband - will not tie up a phone line. Can be used for other internet needs at home and at the remote greenhouse. Fast. Reliable. 3. Microwave - it would impress animals and small children, but that's about it. It's not a serious contender. I guess students could say its ferocious speed and massive bandwidth would be ideal to send 2KB of data every 5 minutes! c. Select the best possible option for Lucy. Justify your selection by discussing the three options above. 3 marks Go for option 2. Dialup may be cheap in terms of equipment, but consider the running costs: dialing 288 times a day at 18c per call would cost $51.84 per DAY! Two cheap ADSL plans could be bought for $40 a MONTH, and small download allowances would not be a problem with the small amount of data that would be sent (288 calls * 2K = half a meg a day = 15M per month.) And the less said about the microwave option, the better.
|
||||||||||||||||||||||||
Question 11
Lucy wants to be able to compare the humidity, temperature and light measurements from different times of
the year so she can identify the best growing conditions for her orchids. Compare the two access methods and comment on the suitability of Peter’s choice for Lucy’s purpose. 3 marks I don't know why she doesn't just use an off-the-shelf DBMS, but anyway... Sequential access requires one to read through all the data between the beginning of the file and the desired point where the data resides... think of having to wind through video tape to get to the third episode recorded on it. Random access allows the input device to jump immediately to the place in the file that contains the desired data, making it quicker. However, for random acess to work, the structure of records must be determined in advance, and the length of each record must be uniform. A sequential file permits records of varying length, and their data tends to be ASCII, which makes it easier to import and export between applications. Gee this brings back memories of QuickBASIC. Ah, the good ol' days of 'OPEN AS RANDOM'. Quick Quiz - why do programmers traditionally use "I" as the index variable in a FOR a loop? Because FORTRAN, the grandfather of BASIC, defined its variables I to N as integer type (IN = INteger - get it?) Naturally you used integers for loop indexes for speed, and the first integer variable in FORTRAN was I - so generations of coders have used I for the first loop index, and J for the second in a nested loop. And why do Unix guys use FOO and BAR as dummy names? It comes from World War 2 Army slang FUBAR which (when cleaned up) stands for "Fouled Up Beyond All Recognition." Anyway enough of that. Let's get back to Lucy.
|
||||||||||||||||||||||||
Question 12 Lucy has a huge project to convert her current greenhouse, and to include her new greenhouses into the new computer climate controlled system. For each greenhouse, she has to coordinate tasks such as a. Which project management tool would be most suitable for Lucy to use to plan her project? 1 mark Gantt chart. PERT is not so good for seeing timelines. PERT's better at showing task dependencies. Repeat after me: It is spelled G-a-n-t-t. Not GANTT, Gannt or variations thereof! b. Describe three ways in which this project management tool will help Lucy manage the project. 3 marks She can see when tasks need to begin and end so contractors can be organised to be onsite when they are required. By allocating people responsibilities for tasks, she can ensure that people are not double-booked or sitting idle. Tasks can be organised efficiently by being set up so they can be done concurrently. Tasks will not be overlooked because they have to be identified and planned in advance. Progress can be monitored and milestones can be checked to ensure tasks are on time.
|
||||||||||||||||||||||||
Question 13 Lucy has decided to trial the new computerised greenhouse climate control system in her local nursery first before installing it in her remote nursery. She also considered two other methods. • running both the new and current system at the same time for a month a. Identify the type of changeover method Lucy has decided to use. 1 mark Trialling a new system on a small scale before rolling it out everywhere is called a pilot scheme. b. Explain why this method is a better choice for Lucy than the other two options. 3 marks You can't realistically use the first option (parallel implementation) - having two different controllers running a system would end in chaos. Which one has the final say about what actions to take? They'd be fighting each other for control. And anyway: it would be no benefit to Lucy because if there were system behaviour errors, it would be hard to see which system failed. Changing to the new system in both nurseries at once (direct implementation / cutover) is quick but risky. If the new system fails, it could be catastrophic. |
||||||||||||||||||||||||
Question 14 Lucy has read a great deal lately about viruses that can attack home computers through Internet connections. Lucy is relying on her Internet connection to monitor her remote nursery’s greenhouse conditions and to alert her of any problems. It is important that her computer is always turned on and connected to the Internet. Describe two ways Lucy could protect her computer against attack from viruses.4 marks Before we start, a firewall or router is NOT relevant. They protect against port sniffing and stop installed trojans from transmitting data back to the hacker. Firewalls DO NOT STOP VIRUSES ENTERING A SYSTEM! 1. She should have virus scanner software running on each computer. The software scans incoming files and looks for text or code that is is known to be in existing viruses. The software can quarantine or delete the infected file. The software must be capable of scanning emails, and the virus definitions must be kept up to date. 2. She should not open any unexpected email attachments. Any staff she hires must be trained to also treat emails with caution. 3. She should not install pirated software (e.g. from Bittorrent) that could be infected. If we're being fussy (and we ARE!), there are hardly any viruses around any more... most of them are worms. Traditional viruses attach themselves to executable code and propagate by attaching to other files. Worms are self-contained malicious programs, usually travelling through email. Gee - get with the 21st century, folks! |
||||||||||||||||||||||||
Question 15 Lucy had to be rushed to hospital for an appendix operation. She was forced to leave her nurseries in the hands of a fellow orchid grower, Edmund. Edmund is very familiar with looking after orchids but has never used a system like Lucy’s new greenhouse climate control system. Lucy had no time to give Edmund instructions on running the system so she told Edmund where to find the 365-page user manual. a. Describe another form of user documentation that should have been available for Lucy to give to Edmund. 1 mark A quick reference card with a summary of the day-to-day operation of the system. b. Identify the main topics this documentation should contain. 3 marks Only day-to-day issues such as: how to recognise reports of system errors that need intervention; how to solve common problems (e.g. stuck blinds, frozen computer, clogged mister nozzles*); how to reboot the system if it freezes; warnings about important dumb things to avoid doing. It would not cover topics like installing the software, extending the system, or technical reference details. * No - Mister Nozzles is not her neighbour, and I doubt she's unclog him if he were. But hell - Mr Nozzles is a great name. |
||||||||||||||||||||||||
Question 16 After Lucy’s system had been set up and working for about three months, a data security company contacted Lucy about backing up her data. This company uses the Internet to transfer customer data to their storage facilities. The company has made the following three claims about their service.
Claim 1: Lucy would not need to worry about the backup, they would do it all for her. Discuss what Lucy needs to investigate before accepting each claim. 2 + 2 + 2 = 6 marks Claim 1
Claim 2
Claim 3
I always thought online backup schemes were boogeymen invented by examiners to scare young IT students around the campfire... but they exist - like this (and the link is NOT a recommendation!)
|
||||||||||||||||||||||||
Question 17 When the system was being designed, Lucy produced a list of objectives for the new system. Objective 1: The temperature, light and humidity do not go outside the set limits. Objective 2 is really badly worded. It sounds like that of all the errors that happen in a month, only two of them will be recorded in the log. All the others will be ignored! What the question is trying to say is "No more than two errors will happen in a month." After six months of operation, Lucy thinks that her new greenhouse climate control system is a success. However, she wants some data to support her feeling, so she has checked the error log from both nursery computers. The content of the error log is shown below.
a. For Objective 1, indicate the data that informs Lucy that the objective is not being met. 1 mark "greenhouse too hot", "greenhouse too bright" Note that I did not select "mist sprayers malfunction" nor "vents stuck". They may eventually CAUSE temperature or humidity to go out of range, but they are not the SAME as temperature or humidity going out of range. Both may malfunction without the undesirable result taking place! b. For Objective 2, indicate the data that informs Lucy that the objective is being met. 1 mark Assuming you have mentally re-written Objective 2 so it makes sense... There is no month with more than 2 faults recorded. c. What additional data needs to be checked to evaluate if Objective 3 has been met? Explain. 2 marks If every error in the log has a matching message in her phone's message history, she can be assured objective 3 has been met. |
||||||||||||||||||||||||
Back to the IT Lecture Notes index
Back to the last page you visited
Created 10 Nov 06
Last changed: March 12, 2022 12:29 PM
Original Content © Mark Kelly 2006
Images and questions are © Victorian Curriculum
and Assessment Authority 2006. Reproduced here with permission for educational purposes.
VCE Applied Computing Notes © Mark Kelly