title

VCE Applied Computing Notes by Mark Kelly

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Software Development

VCAA Exam Post Mortem

2007

VCE IT Exam Post Mortem

Post Mortem Notes

This is not a VCAA publication.
I do not speak for the VCAA, the IT examiners, or exam markers.
I was not involved in the writing or marking of this examination.
Extracts from exams are all Copyright © VCAA, and are used with permission.
Use these post mortems at your own risk.
I reserve the right to change my mind completely, at short notice, about anything I've said here.
Suggestions, discussions and corrections are welcome.

Questions look like this.
My suggested answers look like this.
My editorial ramblings look like this.
Examiners' report comments look like this.
Explanations of answers look like this.

Other VCE IT Exam Post Mortems to enjoy

IPM / ITA / Informatics / Data Analytics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2023


Info Systems / SD - 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2023

 

State averages added 26 Feb 08
* marks my preferred answer in multiple choice

Section A

Multiple Choice

Jump to section B

Jump to section C

Question 1
A recently developed piece of software requires 512 MB of RAM to run effectively.
Based on the information provided below, which laptop is definitely able to run this software?

A.

GSX Super Notebook
Features include:
Celeron 1.8 GHz, 15" XGA, 60 GB HDD, DVDRW LAN, WIFI

B.

HSV Games Notebook
Features include:
Core Duo 2.0 GHz, 256 MB RAM, 100 MB HDD, Bluetooth , DVDRW

C.

SP Business Notebook
Features include:
Core Duo 1.66 GHz, 120 GB HDD, wireless LAN , 256 MB RAM upgradable

D.*

GTX Student Notebook
Features include:
Celeron 1.66 GHz, 17" WXGA, 1 GB RAM, 80 GB HDD, LAN, Bluetooth

Easy peasy.

94% of the state got this right.

Question 2
Stages of software development include

A. designing, testing, operating.
B. analysing, testing, documenting.*
C. analysing, coding, documenting.
D. solving, implementing, evaluating.

The SDLC's steps are ADDIE according to the VCAA. The Software development cycle is ADDTDIE. The Problem Solving Methodology used in ITA has ADDTDIE. Anyone know the difference between them? Anyone at all?

71% of the state got this right.

Question 3
An 'array' and a 'record' are two types of data structure.
The main difference between the two is that

A. arrays can only store the same type of data in each element.*
B. records can only store the same type of data in each field.
C. arrays can only store numeric data.
D. records can only store textual data.

It's true.

50% of the state got this right.

Question 4
A text editor can be used to

A. view and edit program icons.
B. write and test programs without the need for other software.
C. test programs and make any necessary corrections.
D. write programs which can then be tested using another program.*

Most languages now have an editor bundled in with the compiler and linker and debugger to form an Integrated Development Environment or IDE. I believe the first to do this was Turbo Pascal way back when.

56% of the state got this right.


Question 5
When evaluating a piece of software for the role required, the best criteria to use would be

A. stability, reliability and usability.*
B. stability, reliability and popularity.
C. reliability, sustainability and usability.
D. usability, popularity and flexibility.

Popularity is not always important. Sustainability is not as important as any of the items in A.

75% of the state got this right.

The following diagram shows the folder structure for a file server.
Use this diagram to answer Questions 6 and 7.
Directory structure

Question 6
The box labelled 'accounts' in the diagram is best described as

A. a file.
B. a folder.*
C. a hard disk.
D. a field.

A bit easy, I thought.

84% of the state got this right.

Question 7
The full path to invoice b4532 is

A. invoices\b4532
B. accounts\invoices\
C. root\accounts\invoices\*
D. root\accounts\invoices\b 1245\

The others are just silly.

65% of the state got this right.

Question 8
The product code T39.04 is best stored as the data type

A. floating point.
B. integer.
C. text (string).*
D. Boolean.

Hmmm. Far too easy for clever-clogs doing SD.

54% of the state got this right.

The following information is to be used to answer Questions 9, 10 and 11.

Programs A, B and C were run 1000 times each on the same computer. The following statistics were
obtained.

 

 

 

 

  Program A Program B Program C
Total number of errors in output
4
7
3
Average running time
3.2s
2.9s
3.5s
Total number of fatal errors (program 'crash')
1
0
1

 

Question 9
Which statement about efficiency is supported by the evidence in the table?

A. Program A is more efficient than Program C.*
B. Program B is not as efficient as Program A.
C. Program C is the most efficient program.
D. Program A and Program C are both more efficient than Program B.

A couple of bits of knowledge are needed for this:

  1. what criteria relate to efficiency? Only the running time. Numbers of errors and crashes are measures of effectiveness.
  2. what indicates higher efficiency? A smaller number of seconds running time.

B is more efficient than A (2.9<3.2). C is the least efficient at 3.5 seconds' executing speed. A and C are both less efficient (slower) than B.

55% of the state got this right.

Question 10
Which statement about reliability is supported by the evidence in the table?

A. Program A is more reliable than Program C.
B. Program C is as reliable as Program A.
C. Program A is not as reliable as Program B.
D. Program C is the most reliable program.*

Were you looking in the "Number of errors" line, children? Good! The lower the number, the more reliable it was.

70% of the state got this right.

Question 11
Which statement about stability is supported by the evidence in the table?

A. Program B is an unstable program.
B. Program A is as stable as Program C.*
C. Program B is the least stable program.
D. Program C is more stable than Program B.

Look at the number of crashes.

72% of the state got this right.


Question 12
The following IF statement needs to be tested.

IF b > 10 AND b < 20 THEN
PRINT b
ENDIF

The best set of test data for b to test this algorithm is

A. 10, 11, 15, 19,20
B. 8, 9, 10, 11, 20
C. 9, 10,12, 20, 21*
D. 8, 9, 10, 20, 21

Good test data checks valid and invalid values and boundary conditions - the point at which the behaviour of the software should change. Printing of b will happen for numbers 11 to 19 inclusive. You would want to test that 10 and 20 are not erronously included. You want a typical in-range value (e.g. 12). Option C has all those features.

71% of the state got this right.

Question 13
After making substantial changes to its information system, BTQ Pty Ltd kept a logbook of all errors encountered when running the new software. System users were also monitored to see how quickly they completed certain tasks when using the new system. After six months the system performance data was analysed and a report was written for BTQ's management. Which aspect of the System Development Life Cycle is described above?

A. the analysis phase
B. the evaluation phase*
C. the testing phase
D. the operational phase

Note that this all took place after system implementation, so it can't be analysis or testing. 'Operational' doesn't exist. Evaluation is when system performance is reflected on.

79% of the state got this right.

Question 14
Here is a summary of an error log for one of the objectives of a transaction processing system.

 

 

 

 

Total
1 378 467
Successful scans
1 325 411
Unsuccessful scans
53 056
%
3.85%

This data would show that the objective has been met if the objective was

A. a success rate of less than 4%
B. a response rate of less than 4%
C. an accuracy rate of less than 4%
D. a failure rate of less than 4%*

What a strange question. What was it getting at, I wonder?

86% of the state got this right.

Question 15
What is Spyware?

A. any program that runs on your computer to detect spies
B. any program that is triggered by a specific date
C. any program that replicates itself on your computer
D. any program that monitors what you do on your computer in order to use this information without you
knowing*

Well, duh. When in doubt, go for the option with the most words :-)

90% of the state got this right.


Question 16
The clock speed of a CPU is measured in

A. bits per second.
B. bytes per second.
C. hertz.*
D. gIgS.

For D, I reckon the examiner ran out of convincing ideas for dud answers. hehehehe

83% of the state got this right.

Question 17

Pseudocode, Nassi-Shneiderman, Flowchart

Which statement about diagrams 1, 2 and 3 is true?

A. The algorithm represented by diagram 1 is the same as that represented by diagram 2.
B. The algorithm represented by diagram 2 is the same as that represented by diagram 3.*
C. The algorithm represented by diagram 3 is the same as that represented by diagram 1.
D. All three diagrams represent the same algorithm.

Interesting approach to this topic. Nice question. I liked it a lot. The "not eof" decision was counter-intuitive, though - it's like a double-negative. Normally you test for EOF, not the opposite! Oh - by the way - EOF stands for "End of File".

60% of the state got this right.

Question 18
A program is being designed for a networked desktop computer that has 120 GB available on its hard disk drive. It will have to read data from a 500 MB file on a CD-ROM. The CD-ROM drive is on the computer that will run the program. The programmer would like the program to run in the shortest time possible. The main factor that the programmer will have to consider when designing the program is

A. data transfer rate over the network.
B. the size of the computer's hard disk drive.
C. the time taken to retrieve data from the CD-ROM.*
D. the time taken to write data to the CD-ROM.

Is it just me or is this a ridiculously easy question?

81% of the state got this right.

Question 19
When implementing a new system, a large chain of supermarkets decides to install the system in one supermarket while the others continue to use the existing system. When all bugs are fixed the system will be installed at the other supermarkets.
This is an example of

A. pilot conversion.*
B. direct conversion.
C. phased conversion.
D. parallel conversion.

Straight-forward. Remember that pilot and parallel are not complete implementation methods. By themselves, they will not introduce the new system. They are optional accessories to the real, complete methods : direct and phased.

74% of the state got this right.

Question 20
To assist a technician to install a new server on an existing system, which of the following documents would be useful?

A. server technical manual, operating system manual, applications manual
B. server technical manual, system recovery manual, networking manual
C. server technical manual, networking manual, operating system manual*
D. server technical manual, backup manual, system recovery manual

Hmmm. Notice the word "install" is bold and virtually has neon lights flashing the message, "LOOK AT ME! I'M A CLUE!"

You don't really need applications on the server, so rub out A. System recovery manual? Not really. Networking and running the OS seems reasonable. Backup and recovery - what?? I'd say C.

And if you're not enjoying the spectactular blinking of the "LOOK AT ME" message above, get Firefox!

57% of the state got this right.

Section B

Short Answer

Question 1
Describe the differences between a bus, a star and a hybrid network topology. (6 lines) 3 marks. State average=2

Bus is based on a single backbone cable from which branch nodes. A break anywhere in the bus causes failure of the segment. It is usually found in old coaxial-cable networks.

Star has a central distribution device, usually a switch, from which cables radiate to nodes.

Hybrid is simply a combination of more than 1 topology, such as bus and star combined - often called a tree topology.

• Bus: All nodes connecting computers and other devices are on the same cable (backbone). If one node fails everything after that will not work.
• Star: Each computer/device is connected by its own cable that connects directly to a central distribution device (for example, a switch). If one fails it does not affect others.
• Hybrid: A combination of two or more of the above structures (it can be two stars joined, or one star with one bus, etc.).
This was a straightforward question, so it was disappointing that less than half of the students completed it. A significant number of students could not provide a description of any of the topologies listed. The topology most often not attempted was hybrid. These topologies are listed in the glossary of the study design and should form part of the content covered in the course.

Question 2
Robert is a professional photographer who saves an average of 100 pictures (each approximately 2 MB) per day. The hard disk on his computer is rapidly filling up.

a. If he saves pictures on 300 days a year, how much storage space (in Gigabytes) will one year's images
take? 1 mark. 2 lines. State average=0.7

60G

200M per day times 300 days = 60,000M = 60G , or
0.2G x 300 = 60G
Either way, you don't need to use a calculator as one of my students did!

It was pleasing that the majority of students answered this question correctly. A question such as this has not appeared on the paper in a number of years so it was reassuring that students could attempt the calculation correctly using the information provided. A number of students provided lengthy calculations, which was not required.

Judy suggests that he burns the images onto CDs and then removes these images from his hard disk.

The OCR program I used said he "bums the images" instead of "burns the images". Naughty, bad OCR!

b. Describe one problem that Robert may have using CDs as his only photo storage solution. 2 marks. 6 lines. State average=1.5

  • He'd need a lot of CDs (about 94 a year) making searching for pictures a pain.
  • If a CD were scratched or lost, he'd lose his only copy of the images.
  • CDs tend to degrade over time. After a while, there might be big data loss.
  • Not too far in the future, he might not be able to read CDs because technology left them behind like 5.25" floppy disks.

Students needed to describe a problem that may occur if only CDs are used as a storage solution. For example, using CDs as the only storage solution is high risk, because if a CD was lost there would be no back up. In addition, Robert would need an excessive number of CDs to store all the images, and locating a file would be difficult. A majority of students were able to provide an appropriate response to this question. Those who did not receive full marks had generally misread the question.

c. Describe and justify a better solution for Robert to use to store his pictures and keep them safe. 3 marks. State average=1.7

Solution: He'd want at least 2 copies of the pictures, preferably on different media types. A large (terabyte-sized) external USB hard disk plus identical copies on DVDs (which share some of the problems of CDs, but have much greater capacity.)
Justification: The second device would reduce the chances of him losing everything with one technical failure, and using a hard disk means huge, portable, very fast storage and retrieval.

If the exam book does not offer "prompts" for multi-part questions (1. Describe, 2. Justify), you can use your own subheadings to make it clear what you are talking about. It also reminds you to discuss each part!

As this question was asking students to describe an appropriate storage/backup strategy, they needed to describe and justify a number of steps when formulating a strategy. For example, use two different media, such as DVD and an external hard disk, as they are relatively cheap and have a higher capacity then CDs. Store backups in different locations to the ensure safety of the original pictures. This question was poorly done. Many students did not pick up the key point that Robert had only one storage solution, which meant that they needed to provide two alternative storage media as a key part of their response.

 

Question 3
For each of the acceptance criteria listed below, describe a testing procedure that would show if the criterion
was being met. 4 marks. 4 half-page-width lines per criterion. State average=2.05

 

 

 

 

 

Acceptance criteria
Testing procedure

The server must have less than two failures in a month

Count the number of failures in the server's error log.

The network is able to have 150 computers logged on at the same time without crashing

Log in at least 150 of the computers and observe if the network crashes.

More than one user can be using the system and updating the same files at the same time

Get two users to login and open the same files and make changes and see if there are any access errors.

Records can always be retrieved in less than four seconds

Time how long it takes to retrieve records of different types, and at different times of the day - including times of peak system activity. Count the number of times retrieval takes more than 4 seconds.

A bit simple, if you ask me. Unless I've missed something.

 

 

 

 

 

Acceptance criteria
Testing procedure

The server must have less than two failures in a month

Test log failures over a year: if less than two per month, the criterion has been met.

The network is able to have 150 computers logged on at the same time without crashing

Undertake a controlled test of 150 computers: log in and if the system crashes, the criterion has not been met.

More than one user can be using the system and updating the same files at the same time

Have two or more people access and update the same file. Record any problems and check the data file to ensure the file was updated: if done by multiple users, the criterion has been met.

Records can always be retrieved in less than four seconds

Have 150 people all try to retrieve a record at the same time and see how long it takes: if less than four seconds for all, the criterion has been met.

Only 21 per cent of students gained full marks on this question as many students were unable to provide an appropriate ‘testing procedure’. Some students did indicate a test but then failed to describe what data they were looking for or what information they would gain from the test. For example, for the first criterion, ‘log server failures’ was an insufficient answer as it did not go on to state that this would need to be done over a period of time, that the log would need to be checked to ensure that there were fewer than two failures a month during that period, or that one month of testing would be insufficient to ascertain whether the criterion had been meet.

 

Question 4
Hungarian notation is a naming convention for program elements such as variables and objects. The convention is that the first two or three letters of the element's name indicate the type of element. The rest of the name indicates its purpose, and starts with a capital letter; for example a text box containing a first name could be called txtFname. State three benefits of this method of naming. 3 marks, 8 lines State average=0.95

  • The variable type can be seen from its name
  • It reminds the programmer of the type of each variable or object so it is not treated improperly. (e.g. trying to address the .text property of a label in Visual Basic.)
  • When listing objects, they are grouped by type. ???
  • They are independent of a language's inbuilt sigils. e.g. (as Wikipedia informs me) in BASIC, name$ names a string and count% names an integer, and in Perl, $name refers to a scalar value while @namelist refers to a list of values. Using a standard prefix like str, int, sca or lst is less confusing if working with different languages or dialects.
  • It leads to more consistent variable names
  • Deciding on a variable name can be a mechanical, and thus quick, process
  • Inappropriate type casting and operations using incompatible types can be detected easily while reading code
  • In a weakly-typed language such as Basic, it's easy to create logical errors by mismatching variable types or the properties of objects.

Hungarian notation was invented by Charles Simonyi, who programmed at Xerox PARC (which developed the mouse, GUI and Ethernet amongst other groundbreaking technology) and who later became Chief Architect at Microsoft. He is from Hungary, where - like in Japan - people's surnames precede their given name. He would have been called Simonyi Charles at home.

Using appropriate naming conventions for variables and objects:
• allows the programmer to effectively debug
• ensures naming consistency
• ensures easy identification of objects.
Many students did not seem to understand naming conventions within a programming environment, or they had a limited ability to express their knowledge. Many students simply rewrote what was in the question.

 

Question 5
Mick had been an IT teacher at BN College for 15 years. During this time, he had created and supported their administrative system. Management wanted to sell the system to other schools to earn funds for the school. Mick rejected this idea claiming it would create too much work and would interfere with his teaching. Last year Mick moved to a new school in the new suburb of Melinda. He immediately adapted and installed his administrative system in his new school to the disapproval of the management of BN College. Identify and discuss a legal or ethical issue involved in this situation.
4 marks, 10 lines State average=2.0

Since Mick produced the system as part of his work, rather than in his own time, the intellectual property rights would belong to his employer since it was "work product" according to the Copyright Act, 1968. If BN College were a government school, the education department would own the rights to the system. If BN College were independent, the college would own the rights to the system. But morally, Mick might claim ownership since he had created it with his own intellectual powers.

Therefore, the government or college could probably legally restrict Mick's use of the system elsewhere, but ethically he could make a good case that the system was his 'baby' and only he had the copyright, especially if he came up with the idea on his own and worked on it out of work time, and let the college use it out of goodwill.

It's a murky issue, and would make many lawyers a lot of money. But you can see the employer's point of view. If you are a games software company and hire a programmer to create a ripper game which earns millions - who should profit from the sales? The programmer, who was paid, or the company who hired him, paid him, and equipped him to do the job?

Ah, this was interesting, and challenging. Probably too challenging from a legal point of view.

From http://www.copyright.org.au/pdf/acc/infosheets_pdf/G063.pdf

"Who owns copyright in artistic works?
Generally, if you create an artistic work, you are the first copyright owner. However, there are some important exceptions:
• Employees—if you are an employee and create the work as part of your job, generally your employer owns
the copyright. (This rule does not apply to freelancers, volunteers or people who are commissioned to create
artworks).
• Commissioned material—special rules apply if you take photographs, make portraits or create engravings,
where someone pays you to make the work for a private or domestic purpose (such as a family portrait or
wedding photograph).
• Work done for governments—if you create artworks for a State, Territory or Commonwealth government, or a Government is the first publisher of your work, that Government will generally be the copyright owner."

An appropriate answer to a legal issue could have been: If Mick developed this administrative system as part of his work at BN College then the college owns the software and Mick is unable to implement the same system in a second location without the college’s permission.
Students needed to demonstrate their knowledge of copyright laws and apply this knowledge to the scenario provided. Many students were not able to express more than a limited understanding of how copyright laws would be applied in this situation. Students need to ensure that they can apply their knowledge of the law, not just recite sections; therefore, teachers should endeavour to provide scenario-based discussions when addressing laws such as copyright.

END OF SECTION B

Section C

CASE STUDY

Instructions for Section C

Answer all questions in the spaces provided. Remove the case study insert and read all the information provided before you answer these questions. Answers must apply to the case study.

CASE STUDY INSERT

 

Flip Flop Bakery

Flip Flop Bakery is owned by Sebastian, who is a baker. He employs two assistant bakers, three delivery drivers
and four part-time sales assistants.

Flip Flop Bakery makes bread and bread rolls that it sells to the public through a shop. It also sells its bread, and a range of cakes and pastries that are bought from a wholesale cake supplier, to local restaurants, coffee lounges and clubs.

A typical working day follows this sequence.

  • Sebastian and the assistant bakers arrive at the bakery and start baking at 4.00 am.
  • All breads and other bread products (bread rolls and so on) are baked by 7.00 am.
  • The bakers identify any ingredients that are in low supply and inform Sebastian.
  • The drivers arrive at the bakery and start loading their trucks at 8.00 am.
  • Cake deliveries arrive at the bakery around 8.00 am.
  • The bakery drivers deliver their goods and invoices to the customers from 9.00 am.
  • Drivers handwrite orders from the regular customers and return these to the bakery by 1.00 pm.
  • Sebastian manually combines the orders and writes a list of the next day's baking requirements.
  • Sebastian telephones his orders for the necessary ingredients and cakes from his suppliers. Orders must be
    placed by 3.00 pm to ensure delivery for the next day's baking.
  • The bakery closes at 5.00 pm.

The problems

Sebastian has identified a number of problems that, because of the growth of his business, have now become
critical.
1 When drivers return to the bakery later than 1.00 pm, Sebastian cannot complete the next day's list of baking
requirements.
2 Some drivers have such bad handwriting that Sebastian has trouble reading the orders.
3 Sebastian now spends too much time combining the orders and completing the next day's baking requirements
list.
4 Sometimes Sebastian cannot order extra ingredients on time therefore he cannot bake all of the next day's
bread and so loses orders.

Proposed system

To ensure the continued success of his business, Sebastian realises that he must make some changes to his ordering processes. Sebastian's daughter, Kayla, has just completed the first year of a university course in software engineering. She offers to look at how the problems might be solved.
Kayla believes that the only way to improve efficiency is to have a computerised ordering system. There would be a computer at the bakery and the delivery truck drivers would have some kind of mobile device. They would use this to collect and transfer data to the new computer.

 

Case study diagram

Figure 1

 

Kayla knows that to help Sebastian she must first fully understand the problems, and then analyse the current system.

To start her system analysis, Kayla has drawn the diagram (Figure 1) in the case study insert. It shows the movement of goods, invoices and orders associated with Flip Flop Bakery's operation, and the role of the various people involved. She now has to create a logical design for the bakery's information system by drawing a context diagram and data flow diagrams, as well as constructing a data dictionary.

Question 1

Kayla has started the context diagram.

Context diagram

a. The label for the unnamed entity should be (1 mark) State average=0.5

Customer

... but where are the drivers? If bakers are external entities, why aren't drivers? Odd...

b. Figure 1 in the case study insert shows three arrows going between the Cake supplier and the Bakery, but the context diagram only shows two. Explain this difference. 1 mark, 3 lines State average=0.2

Cakes are not data flow and should not appear in DFDs / context diagrams.. They are cakes. Yummy cakes.

Is there a Cake Flow Diagram?

c. Kayla has based her context diagram on Figure 1. Explain why she has drawn the Bakers as a separate entity. 1 mark, 3 lines State average=0.36

She's just wrong??

I have absolutely NO idea. Throw me a bone, someone. If bakers are external entities even though they exist within the data flow of Flip Flop Bakery, why are drivers not also external entities?

Unless the drivers belong in the empty box in the question above... in which case why don't customers appear in the DFD?

I'm confused.

A reliable teacher friend says:

'They provide data to the 'system' rather than process the data so they would be considered entities rather the part of the system.'

Ahhh. Everyone - remember that!

The Bakers provide data to the system rather than processing the data, therefore they would be considered an entity rather than part of the system.
The use of context and data flow diagrams in the written examination has been relatively consistent over the last few years; therefore teachers and students should have been well prepared for this style of question. However, this question required students to explain their understanding rather than to construct elements of a diagram, which caused problems for a number of students.
Students need to practise constructing context and data flow diagrams and also need to have an understanding of the theory behind the decision making for each element represented. The relevant key knowledge point for this question also requires students to be able to construct data dictionaries .

Question 2
Kayla has made three attempts to draw a data flow diagram for the processing of customer orders and determining the baking requirements. Consider the accuracy of the DFDs shown below.

DFD

DFD

DFD

a. Identify the most correct data flow diagram. 1 mark State average=0.45

DFD C << official VCAA answer. I thought it was A.

My approach was to find out what all 3 diagrams had in common so I could more easily discover where they differed. So the old highlighter came out. In red I marked all the items that all 3 diagrams shared. The remaining bits were marked in blue... Your strategy might have differed,

That helped me focus on the main points where the answer probably lurked. It became immediately obvious that in DFD B, its blue data flow had been discovered before: it was the 'cake flow', not a data flow. So that had to be wrong.

In DFD A, the odd man out was "Ingredients getting low". That needed close checking. The case study insert definitely shows the bakers sending a list of ingredients that are getting low to Sebastian, so that looks fair enough.

DFD C lacks this data flow - but then again there are several data flows missing in all 3 diagrams - invoices coming in from the bread ingredients supplier and cake supplier, and the outgoing orders for ingredients. Whether this was intentional or not is hard to see, but the question clearly asks for the most correct DFD...

So DFD A seemed to be the most correct. A lot of brainwork for 1 mark. Ripoff! :-)

But the thinking spent on 2a also supplies the answers for 2b, so it's not so bad...

b. Explain the main error is in each of the other two data flow diagrams. 2 marks, 3.75 lines each State average=0.7

DFD B is incorrect because the input of "flours, yeast, sugar" is a flow of goods, not data.

DFD C is incorrect because it lacks the "ingredients getting low" data flow from the bakers to 'Process Orders'

DFD A is incorrect because it has an input ‘low ingredient’ that is not required to process orders. Also it does not lead to any output.
DFD B is incorrect because it shows a data flow that is ingredients (flours, yeast, sugar) rather than data.

Kayla has also created a data dictionary, part of which is shown below.

 

 

 

 

 

 

Flip Flop data dictionary - page 3
Name Description
Items to be baked List of bread and bread rolls (items) to be baked for next day's requirements
Composed of: Item name + quantity required
Recipe ingredients Ingredients and quantities needed to bake a particular item
Composed of: Item name + number made + ingredients list
Calculate quantities needed Use recipe ingredients and items baked to work out how much of every ingredient is needed
Item name Name of item to be baked; for example, multigrain loaf, bread roll


c. Identify one inappropriate entry in the data dictionary and explain why it is inappropriate. 2 marks, 4 lines State average=0.65

"Calculate quantities needed" is a process or algorithm, not a datum. It belongs in an IPO chart rather than in a data dictionary.

Impress your friends at parties: say "a datum" at every opportunity.

The inappropriate entry in the data dictionary was 'Calculate quantities needed' as this is a process, not an element of data.
Question 2 required students to interpret elements of a data flow diagram. Part c. asked students to demonstrate their knowledge of a data dictionary, and tested new content in this study design. It is clear that this area may need to be covered in more depth. Teachers should be incorporating this into their System Analysis and Design concepts along side DFD.

Kayla has completed her analysis of the system. She has decided to start the design of the new system with the design of the software. From her analysis she knows that one thing the system has to do is to calculate the required amount of each ingredient.

She designs an algorithm that

  • reads a file to get the total number of different ingredients Sebastian keeps in stock (Num_Ingredients)
  • for each bread item (Product_ID) ordered, uses recipe data and the number of items ordered (Num _ Ord) to
    calculate the amount of each ingredient required for that item (Amount_ Req)
  • adds the ingredient amounts required for each item to get the total quantity needed for each ingredient
    Qty ()

The procedure will have passed to it data that lists the amount of each ingredient required for every bread item made by the bakery (Product_Recipes)


Here is Kayla's algorithm.
pseudocode

Question 3
a. What is the purpose of the first REPEAT - UNTIL loop? (1 mark) State average=0.1

It initialises all of the Qty array's elements to zero. It uses Ingredient_ID as the loop's index (counter).

The REPEAT – UNTIL loop initialises (sets up) the array to store the quantity of each ingredient.

To test the algorithm Kayla decides to use some simplified test data with only 1 bread product and only 3 ingredients.

b. Using the data below complete the test table (3 marks) State average=0.3

Test data

 

 

 

 

 

 

 

Variable Initial Value
Num_Ingredients 3
Product ID 1
Num Ordered 10
Product_ Recipes(1,1) 0.15
Product_ Recipes(2, 1) 0
Product_Recipes(3,1) 0.20

That's odd. Why is the indexing of the array reversed? It should be (1,3) for example - product 1, ingredient 3. That's the order it is in the algorithm. (Note: this has been confirmed as a rare booboo by the SD exam writers. It's not significant to the answers, however.)

Test table

 

 

 

 

Variable Expected value Actual value
Qty(1)
1.5
0.0
Qty(2)
0.0
0.0
Qty(3)
2.0
2.0

c. Describe the error in this algorithm (1 mark) State average=0.1

The initialising of Ingredient_ID to 1 in line 12 is wrong because the variable is incremented at the start of the loop, so the starting value is actually 2, not 1. This makes it skip the first ingredient altogether.

Ingredient_ID is set to 1 in the first of the nested repeat loops and immediately in the second part of the nested loop it is increased by 1, so the amount of the first ingredient is never calculated.
Students needed to have a full understanding of each of the elements within the algorithm in order to answer this part correctly.

d. Suggest one way the algorithm could be altered to fix this error (2 marks) State average=0.15

Line 12 should be...

Ingredient_ID Equals 0

Either of:
• change the initial value of Ingredient_ID from 1 to 0 in the second loop
• move the Ingredient_ID increment line to the end of the loop and change the terminal conditions from UNTIL Ingredient_ID = Num_Ingredients to UNTIL Ingredient_ID > Num_Ingredients
Question 3 challenged students. Only a very small number completed all parts successfully, and over 80 per cent scored no marks for all parts. The algorithm in the question was not overly complicated; however, the use of a two dimensional array may have provided an extra element of difficulty that prevented many students from attempting the question.

 

Question 4
Complete the following data table by inserting the correct data type from the options integer, floating point, string, boolean, one dimensional array and two dimensional array. 3 marks State average=1.1

 

 

 

 

 

Variable Use Type
Ingredient_ID Loop Control on Ingredient ID integer
Num_Ingredients Total Number of Ingredients integer
Qty( ) Quantity in kilos of an Ingredient one dimensional array
Product_ Recipes( ) Quantity of a particular item required for a single product two dimensional array

This question type has occurred in a variety of forms since 2002; however, only a small percentage of students were able to gain full marks.

 

Question 5
Kayla and her uncle Michael, an experienced programmer, were discussing the best file structure to use to store the orders for each day. Sebastian has 300 regular customers who have different orders for each day of the week. As well he can have 50 casual orders on any day. Twenty-five per cent of his regular customers alter their daily order from week to week. Kayla suggests using a simple Serial Access file while Michael argues that due to the number of changes each day, a Random Access file would be best.
For the bakery's application, explain the advantage of the Random file structure for the organisation of this data. (2 marks, 6 lines) State average=0.5

Data would be faster to access, modify, and manage. It would give functionality similar to a database. It would also be far easier to scale up to large sizes compared to a simple, dumb serial file.

A record in a random file can be accessed instantly by its record number, and a record is read as a single cohesive package with a known structure. All the records between the current read position and target position can simply skipped over.

Also, random file is opened for both read and write access. A serial file must be closed and reopened in the desired mode.

A serial file must be completely read and written as a single unit. One can't (for example) open it, change data item 45 and close it again. You'd have to open it in read mode. Read all the data up to item 44 and simultaneously write it to a second file that is opened in write mode. You'd read the target item (#45), change it, write it to the output file, then go on and read every remaining data item and write it to the output file! That's a serious amount of disk activity to modify a single data element!

Serial files are simply a sequential list of data items. To read an item from the list, one must start reading at the start of the file and read every data item up the one you want. If the data consists of groups of related fields (such as the buyer's name, the goods ordered and the quantity), you then have to read the items individually. If the reading gets 'out of sych' so you start reading data in the middle of a 'record' rather than at its beginning, you start getting rubbish data.

The single-unit records in a random file, on the other hand, are read and written as a single object, and the fields in the records can be referred to easily by their field names. e.g. employee.surname (where employee is a record and surname is a field in the employee record..

Yeah - a bit longer than the 6 lines available on the paper, but I added more as an educational freebie.

Appropriate responses included the following.
• A Serial Access file would be unsuitable because each new order is written to the end of the file, and finding a required order would be difficult as Sebastian would have to go through each in turn until he found the required order. The same would be true for changing customers’ orders. However, Random Access files allow Sebastian to locate customer orders efficiently as the files can be added or accessed in any order; this also allows orders to be changed more efficiently. This would be important since many regular customers change their orders with the bakery. • The entire Serial Access file must be read and written each time there is a change, but Random Access files can be searched and only the part that is changed needs to be rewritten. This is important as a large number of daily changes to orders must be made.
Although similar questions have appeared in past examination papers, many students were unable to provide responses that showed their understanding of Random Access files versus Serial Access files

STRUTH! THIS PAPER SEEMS TO GO ON FOREVER!

Question 6

As part of the design of the new system, Kayla must decide what kind of mobile device the drivers should use.
She has a choice of the following.

  • A laptop - this will be used to enter and store orders which will then be uploaded to the bakery's computer
    on return.
  • A Personal Digital Assistant (PDA) - this will be used to enter and immediately transmit orders from the
    van to the bakery's computer.
  • A mobile phone - this will be used to text or phone the orders from the van to Sebastian at the bakery.

State two advantages of each device for the given use. (6 marks, 2 lines each) State average=2.45

Note the bold words "given use". They don't want you talking about other activities the device could be used for.

Laptop

Advantage 1 - its keyboard is faster and easier to use for data entry

Advantage 2 - its screen is far larger and can display much more data at once

PDA

Advantage 1 - data is transmitted - and can be acted on - as soon as it's received by the driver. There are no delays waiting for the drivers to return to the bakery before Sebastian can phone in his orders by the 3:00 deadline.

Advantage 2- it's small, light and easy for the driver to carry in a pocket

Others - Its battery would easily last an entire day's operation.

Mobile phone

Advantage 1 - like the PDA, data can be received from drivers before they return to base.*

Advantage 2 - Its battery would easily last an entire day's operation.*

* Try to avoid repeating the same answer for different sections, even if it's appropriate. Try thinking of something else. But it is hard trying to find an advantage of the phone that the PDA does not have.


Question 7
Kayla has decided that the best device for the delivery drivers to take orders would be a Digital PDA. These will be used to transmit orders from the van to the Bakery's computer. Sebastian agrees with this choice. Kayla has three PDA models to choose from. The specifications are given below.

 

 

 

 

 

 

 

 

 

Key features Peach Watermelon Strawberry
RAM 8MB 32 MB/expansion slot 16MB
Display 65 000 colours 65 536 colours 65 536 colours
Input touch screen QWERTY keyboard; touch screen QWERTY keyboard
Connectivity Internet enabled mobile phone Bluetooth Internet enabled mobile phone
Battery Rechargeable/ replaceable Rechargeable// replaceable; extra cell Rechargeable/ replaceable; extra cell
Processor 200 MHz 400 MHz 300 MHz
Resolution 320 x 320 480 x 640 480 x 640
Camera no yes no


Considering the role that the PDAs will have, recommend the most suitable model. Give two reasons to justify your answer. 4 marks State average=2.3

Recommended PDA - Strawberry

Reason 1 - it has an internet enabled mobile phone which is necessary to send data back to the bakery (unlike the Watermelon's short-range Bluetooth)

Reason 2 - the QWERTY keyboard will make data entry very convenient and quick.

Also: the screen has good resolution and no other feature is significantly worse than the Peach.


Question 8
Kayla now plans to set up the new system.
She explains that buying the bakery computer and PDAs and setting them up will take about 3 days; writing, testing and debugging the programs for the bakery computer will take 20 days; writing, testing and debugging the programs for the PDAs will take 15 days; and testing the whole system and making sure it works could take 5 days.
a. Complete the Gantt chart below to show how the four tasks could be completed inside 30 days. 4 marks State average=3.05




b. The task 'test system' is dependent on both programming tasks being completed first. Show this on your Gantt chart above.1 mark State average=0.25

Refer to the beautifully mouse-drawn dependency arrows.

Of course this Gantt assumes there are at least 2 programmers on the job!

Question 9
Michael has agreed to help write the programs for the new system. He has advised Kayla that he wants the programs to have good internal documentation: they should contain comment lines and all variables and procedures should have meaningful names. Kayla feels this is a waste of time as she can program much faster with short variable names and no comments. Explain why Kayla should follow Michael's advice. 2 marks 7 marks State average=1.15

Meaningful variable names make it easier to remember what variables are used for and help avoid using the wrong variable by mistake. Is is especially useful when you return to your code after some time has passed and you must re-learn your unintuitive names all over again. It is also valuable when other people must maintain your code.

Internal documentation reminds the programmer and co-programmers what the code is meant to do and why things were done as they were. Without such inline documentation it is easy for you or a colleague to change some code without realising the implications of what you were doing.


Question 10
Kayla is writing the program for the PDAs. She is concerned that the drivers may accidentally enter the wrong information into the PDA. Describe what type of data validation Kayla needs to code into her program to limit the following possible errors.

a. A driver enters 100 dozen loaves instead of 1 dozen loaves. 1 mark. State average=0.4

A range check.

b. A driver tries to enter an order for a bread product that Flip Flop Bakery does not make. 1 mark State average=0.5

An existence check (ensures selections exist in the bakery's catalogue)

Question 11


The diagram above shows Kayla's first attempt at an interface for the PDAs.

a. What design error has she made? 1 mark State average=0.5

When deciding on the width of the interface, she has made it wider than the horizontal number of pixels the screen can display.

b. How can it be improved? 1 mark State average=0.55

Reduce the font size of the labels and text boxes so they fit within the display's limits. Also move the buttons so they are fully visible.

You know what you want to say, but it's hard to work out how to not sound dopey!


Question 12
The diagram below shows a screen for the bakery computer that will alert Sebastian that there is an incoming
message.

a. What is the logical error with this screen? 1 mark State average=0.45

How can you tell whether you want to allow or cancel the message without knowing what the message is or whom it's from?

b. Describe how to change this screen to correct this error. 1 mark State average=0.45

Add a control to display all or some of the message, or at least show the identity of its sender so you can judge whether you want to pay attention to it.


Question 13
In their many discussions, Michael has reminded Kayla that staff need training. She tells Sebastian that he has to close the bakery for a day so that she can train everyone including the bakers, drivers and sales staff. She will train them in all aspects of the system. Sebastian is concerned about the cost of shutting the bakery but Michael has other concerns.

a. State a concern with this training strategy other than the cost of shutting the bakery.1 mark State average=0.45

They are training everyone in everything, which means everyone will be getting some irrelevant information.

b. Briefly describe a better approach to make certain that staff can operate the new system. 1 mark State average=0.55

People ought to be trained in groups according to their roles, so the content of the training can be tailored to their needs.


Question 14
As well as training, Michael suggests to Kayla that she should produce user documentation for the drivers to use while making deliveries. Kayla has several ideas.

Option 1 - Burn a video onto DVD so they can see what to do
Option 2 - Put help onto Flip Flop's new website
Option 3 - Print a quick guide that covers basic use of the software onto a card that can be put into their pocket
Option 4 - Electronic help manual with a search facility stored on the PDA

State which option is the best in this case and justify your answer. 4 marks 9 lines State average=2.45

Overall, Option 2. It depends a lot on how much information you want to give them. For very basic facts, the quick guide would suffice, and be very easily accessible. For comprehensive details, the website might be slow to access, but it can be quickly and easily updated. The help manual would take more time and skill to produce. Since they can't view a DVD on a PDA, option 1 is silly.

Didn't like this question. It needed more context. Only 1 option was ridiculous: the other 3 had pros and cons but not enough is known about the amount of training the bakery wanted to give the drivers.

Question 15
The system is in its first week of operation: all the drivers have a PDA and the bakery computer is also operating as a web server. The PDAs are successfully accessing the bakery's website through the Internet and transmitting orders. Sebastian, however, has read an article about conducting business on the Internet. He has discovered that

  • his website could be accessed by unauthorised people
  • there might be times when the PDAs are not able to connect to the web server.

For each of these situations, explain a strategy that the bakery could use to limit or eliminate the concern.

a. The website can be accessed by unauthorised people. 2 marks State average=1.25

Authenticate people accessing the site by making them enter a valid username and password..

b. There might be times when the PDAs are not able to connect to the web server. 2 marks State average=1.05

During times the PDA cannot connect to the server, the software should be able to store orders for later transmission when conditions are favourable.

Overall - a very challenging and very easy exam - in different places. Few complaints at all about quality of the expression or clarity of the questions.
Cheerio. See you at next year's SD post mortem!

Back to the IT Lecture Notes index

Back to the last page you visited

Created 15 November 2007

Last changed: March 13, 2022 11:31 AM

Original Content © Mark Kelly 2007
Images and questions are © Victorian Curriculum and Assessment Authority 2006. Reproduced here with permission for educational purposes.

VCE Applied Computing Notes © Mark Kelly