VCE Applied Computing Notes by Mark Kelly
Software DevelopmentVCAA Exam Post Mortem2011 |
Other VCE IT Exam Post Mortems to enjoy IPM / ITA / Informatics / Data Analytics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2023
|
Post Mortem Notes This is not a VCAA publication.
Examiners' comments added 15 May 2012I do not speak for the VCAA, the IT examiners, or exam markers. I was not involved in the writing or marking of this examination. Extracts from exams are all Copyright © VCAA, and are used with permission. Use these post mortems at your own risk. I reserve the right to change my mind completely, at short notice, about anything I've said here. Suggestions, discussions and corrections are welcome. Questions look like this. |
|
||||||||||||||||||||
Written examinationThursday 17 November 2011 Reading time: 11.45 am to 12 noon (15 minutes) Writing time: 12:00 noon to 2:00 pm (2 hours)
Materials supplied
Instructions
At the end of the examination
Students are NOT permitted to bring mobile phones and/or any other unauthorised electronic devices into the examination room. |
SECTION B - short answer questions
|
Question B1 Maria has a program that works well on her laptop and she would like to put it onto her Personal Digital Assistant (PDA).
State average was 68% Characteristics that will need to be considered include (two of): |
Question B2
As shown in the diagram above, data flow diagrams (DFD) and use case diagrams (UCD) share similar symbols, but their purposes are not the same.
2 marks State average was 60% While it was clear that most students had studied both diagram methods, many were not able to clearly articulate the
purpose of the lines or the purpose of the circle/ellipse in each diagram. Students should be able to read, draw and write
about each of these diagram methods. The following is an example of a high-scoring response.
The DFD's circle is a process where data is changed or manipulated in some way. e.g. Create invoice 2 marks State average was 55% The following is an example of a high-scoring response."The ellipse in a UCD shows a use case – an interaction that a user has with the system, whereas a circle in a DFD shows a process in the system, where data is manipulated or transferred.".
|
Question B3 Brian is a programmer for a large IT services company. He is in charge of the development of a security system for a financial services company that maintains a large credit references database that big banks rely on when people apply for loans. The system is due to be finished in a month's time. Brian's manager has just told him that they will need to deliver it to the customer in one week as he has promised the finance company that it will be ready by then. Brian knows that the testing process will not be finished and that he cannot guarantee the security of the system. He knows that this is not right for the customer, but does not really know what to do about his manager's request. a. Explain how a code of ethics could assist Brian in dealing with this situation. If the programmer's code of ethics specified that a programmer should not deliberately release software that is known to have significant security or safety deficiencies, he could use that as an argument against his manager. He would also have the backing of his professional association if the manager caused Brian trouble over the issue. 2 marks State average was 33% The following are examples of high-scoring responses. Brian is in an ethical situation, wanting the best for the customer and to obey his manager. A code of ethics is guidelines that all
must follow, it can give Brian the reasoning and privilege to not obey his managers demands and follows the rules of ethics
towards the customer. b. Assuming Brian's organisation has a code of ethics, outline how a decision support framework could assist in resolving this ethical dilemma. A decision support framework gives decision-makers guidelines on how to behave in given circumstances. If the framework foresaw such a dilemma arising, it could advise both Brian and the manager about what actions would be appropriate or necessary to resolve the problem. e.g. "If a manager issues instructions that a worker considers morally or professionally unacceptable, the matter should be directed to the head of human resources." 2 marks State average was 33% The following are examples of high-scoring responses. A decision support framework is a package of resources that helps to prevent conflicts from occurring, and describe how to resolve them when they do occur. A decision support framework will outline the steps needed to resolve the conflict and Brian can go through these steps which will involve listening to all points of view in order to resolve the dilemma. A code of ethics and decision support frameworks are part of Unit 4, Outcome 2 and are both new to the study.
A code of ethics outlines the values of the organisation and the expected behaviour of employees. Most students struggled to provide a clear and accurate response to this question, with many simply stating that 'the code of ethics/decision support framework would help Brian'. In this style of question it is important that students provide a definition/description/explanation as well as relate the response to the scenario presented. For example, students should have explained what a code of ethics is, as well as how it was going to help Brian in this situation.
|
Question B4 Big O Television's secure computer network was recently breached. Big O Television has hired an independent IT security company, Secure TVtech, to test the security of its network and provide support in identifying and repairing any weaknesses in its security. They would carry out a penetration test. Without being given any special knowledge about the system, they would attempt to break into the network from outside the firewall and record the weakness they discover. 2 marks State average was 63% Many students discussed a version of ethical hacking to test the security. Students are reminded to use technically correct IT terminology. Many students used terms incorrectly, including white-box, black-box, white/black/grey hat hacker, penetration testing, cracker, etc. Appropriate responses included the techniques of penetration testing or packet sniffing and a technical and accurate description of how the technique works. b. Explain how a security audit of the computer network may have prevented the original network breach at Big O Television. A security audit is a systematic technical assessment of how data security is managed in a system. Unlike a penetration test, which is done without special privileges, an audit is carried out - with full privileges and inside information - within the system to assess security weaknesses. They may use interviews with staff, vulnerability scans, technical inspections, reviewing security policy and procedures, and the use of network monitoring software. The audit may inspect password policies, review audit trails, check the state of security patches on key software, test the disaster recovery plan, etc. 2 marks State average was 50% A security audit is a preventative security measure; it not only examines the equipment (hardware and software) but
other elements of the information system (people and procedure) to ensure there are no security issues. A security audit would have involved security experts examining the security of the system to identify weaknesses and gaps in the security. This may have involved the identification of the weakness that allowed the original network breach, thus allowing Big O Television to remove the weakness. The breach therefore may have been prevented. This question required students to show their knowledge of security techniques and how the techniques may be tested. It is important that students read questions carefully and ensure they are answering the question asked, as a number of students wrote about what security could be implemented. Students are encouraged to highlight or underline key words and phrases in questions during writing time. |
Stand by - this is a doozy. Probably the silliest question ever to appear in a Software Development exam. |
Question B5 Caitlin and Ryan are discussing the best way to store their new software solution and the data files it uses. The software, which company employees will need to access every day, is 80 gigabytes (GB) and uses several data files which will grow in size over time. Caitlin suggests the software should be stored on the file server and the data files could be stored on DVDs. Ryan suggests that as the software is not very large (80 GB) it could also be kept on the same DVD as the data files. The network administrator is not happy with either solution. Provide a better solution for Caitlin and Ryan and give three reasons to support your solution. When I first read this, I had to sit down. I assumed it had to be a complex misprint. But no, it's a serious question. It's hard to know where to start with the massive unreality of this case study. Caitlin and Ryan should not be let loose from a sheltered workshop, much less working with real IT. - Let's start with the software. It's said to be 80G... 80,000 megabytes. Even Windows 7 is nowhere NEAR 80G! My entire Windows and Program Files directories only add up to 47G - and I have a lot of programs! What does this software do - run the planet? Surely the examiners could have come up with a scenario that tested students' technical knowledge just as effectively without turning it into a 'Three Stooges Do I.T.' farce? This question was nearly as bad as an Adam Sandler movie. Solution Take Caitlin and Ryan out the back, shoot them, and then terminate their employment. The 80G software would need to be installed on the hard disks of workstations. The data files could be stored on the file server. Reasons
1+3 = 4 marks State average was 66%
A significant number of students were able to correctly identify that 80 GB would not be able to fit on a DVD and
provide an appropriate, justified solution. The most appropriate solution was to store data on a file server, which a
majority of students described; however, a range of other reasonable responses was accepted.
The following is an example of a high-scoring response. Solution: Store the software on the file server and store the data files on the file server.
|
Question B6 Wendy and Gareth have been asked to design an intranet for the residents of an aged-care facility. This intranet will provide access to suitable mind-challenging games. It will also allow residents to upload photos and leave comments. User characteristic - Poor vision Effect on design - large text, good contrast User characteristic - Poor fine-motor muscular control Effect on design - large controls, low sensitivity settings User characteristic - lack of IT experience Effect on design - interface must be intuitive, lots of help easily available, avoid jargon User characteristic - Closeness to death Effect on design - Make the system fast and responsive, so they can make the most of it in the time they have left. OK. Maybe not the last one. 2 marks State average was 55% Most students were able to identify user characteristics such as vision impairment, physical impairment, education
level, experience with technology, etc. and were able to describe how this would affect the design of the website. Visual impairment: will need to design a solution with high contrast and large interface elements to accommodate for the user's
impaired vision. |
Case study
Bigton City Car ParkingThe large regional city of Bigton has a busy central business district (CBD). Over the last few years parking in the CBD has become a concern. One difficulty is that too many people overstay the time limits of the parking bays in the CBD's streets. Employing enough parking officers has also become a problem, so the Bigton City Council has decided to look for a technological solution to the problem. City Engineer, James Jones, proposed that the city purchases and installs a commercially available solution that detects vehicles that have overstayed the time limit. However, after examining one such solution, the Council decided that it provided a lot of features the city would never use and it was too expensive. The Council asked James to investigate creating the city's own solution. Its only purpose would be to detect overstaying vehicles and notify parking officers where these vehicles are parked. After some thought and investigation, James drew the plan shown below. Parking Infringement Monitoring System (PIMS)
During his investigation James found out that the Council gives all its parking officers a mobile phone for use on the job, which means that these do not have to be purchased for the system; they would just need some software written for them. He also found that all the other hardware needed for the system, including a portable Bluetooth printer, can be purchased 'off the shelf'. The CDUs and RDLs operate automatically, but the dedicated computer would need software written for it. The computer can be connected to the Council's existing network, which would allow it to interact with the Council's fines-payment system. To take his idea further, James hired programmer Kirsten Koder. After interviewing James, Kirsten drew a use case diagram of the proposed Parking Infringement Monitoring System (PIMS). It is shown below. The Car Detection Unit (CDU) The type of CDU James has decided to use in the system is a small self-contained device about 5 cm long. It is designed to be placed just under the surface of a road. When the magnetic field around it is disturbed by a car, the CDU transmits a data signal that contains a 12-digit code as shown below. Since 1990, each parking bay in Bigton has been allocated a bay number, as shown in a section of the city map below. Since the CDU ID number is programmed at the factory and cannot be changed, James has decided that the best way to provide its location is to match the CDU ID to the bay number. Parking bays |
||||||||||
Instructions for Section C Answer all questions in the spaces provided. Remove the case study insert and read all the information provided before you answer these questions. Answers must apply to the case study.
|
||||||||||||||||||||
While looking at the plan drawn by James, the engineer, Kirsten noted that there would be four different data transfers. She also noted that one of the data transfers will not need TCP/IP. Data transfer from CDU to RDL Explanation The transfer is not being routed through the internet like the other three, and to use the internet you must use TCP/IP for packet handling and routing. The transfer might use Bluetooth instead, since the CDU and RDL are said to be "nearby". 1+2 = 3 marks State average was 52% Most students were able to identify that the data transfer from CDU to RDL was the one that did not require TCP/IP.
However, many students struggled to provide a technically accurate description as to why it was not required. TCP/IP is
a protocol for Internet use and the use of the Internet is not required for this data transfer. Stating 'because it is not
required' was not sufficient and simply restated the question. "Data transfer from CDU to RDL |
||||||||||||||||||||
Question 2 To check that she had understood James' plan, Kirsten showed him the use case diagram. He expressed concern that the dedicated computer was not shown in the diagram. The actors shown in the UCD are external entities that exploit functionality within the system. Since the dedicated computer is the system it does not interact with itself from outside of itself! 1 mark State average was 40% Students had some difficulty with written responses regarding use case diagrams. As use case diagrams are new to the study, teachers are encouraged to provide more questions of this type throughout the year. Appropriate responses made comment about the dedicated computer not being included in the use case diagram because it was not being an actor (but part of the system). |
||||||||||||||||||||
Question 3 Kirsten will include the use case diagram in the Software Requirements Specifications (SRS) she is writing. State two functional requirements of the Parking Infringement Monitoring System (PIMS) that this context diagram would show. Give an example of each. Functional requirement 1 - Calculate if cars have overstayed their parking time. Example - ? For example, a car stays too long in a parking bay?? Functional requirement 2 - Transfer ticket details Example - Send ticket data to the fines payment system. (??) First problem: a context diagram will show no functional requirements. A context diagram doesn't show any processes: the system is a black box. The CD will only show data flows between the system and its external entities. FRs might be suggested by the data flows, but the FRs themselves are not shown. Second problem: how can you provide examples of specific functional requirements? Third problem: a big part of the system is calculating when cars have overstayed their time, but this FR is not shown in the UCD. The closest use case is "register car arrives and/or departures" which is different to calculating the time intervals between the events. I'm confused. 4 marks State average was 48% A range of responses was accepted as long as the student could clearly articulate the functional requirements of the
system. Functional requirements include: |
||||||||||||||||||||
Question 4 When writing the SRS, Kirsten identifies user-friendliness, response rates and maintainability as important non-functional requirements of the system. Most critical non-functional requirement - Response rates. Justification - since the allocation of parking tickets is strictly time-dependent, any lag in getting data on car arrival/departure times could lead to overstaying cars leaving a bay before the parking officer can get there to deliver the ticket. A responsive system will react in a timely manner to critical events like these. 1 + 3 = 4 marks State average was 46% The most critical non-functional requirement in this situation is response rate. When justifying a choice, students who
appropriately contrasted response rate with the other non-functional choices generally provided better responses. The following are examples of high-scoring responses. Justification: Seeing as how the parking officer will need constant updates as the whereabouts of each overstaying vehicle, the response times between detecting an overdue car then the RDL sending this information through to the council's dedicated computer and then on to the parking inspector will need to be very short. How easy the program is to use is irrelevant because there is no handling by users, it is all automatic beside the information received by the officer, and the maintainability, whilst in its own right be an important part, is not considered as it is required but the devices are assumed to be very robust. |
||||||||||||||||||||
The analysis is now complete. Kirsten has submitted the SRS to James and he has told her to begin designing the software for the dedicated computer and the mobile phones. Kirsten starts with the dedicated computer. It will deal with the use case 'register car arrivals and/or departures'. Kirsten has drawn the following data flow diagram (DFD) to help her with the design of the software.
1. I've always told my kids that each piece of data should have its own arrow. This DFD has multiple data items on the same arrow. UPDATE - 28 June 2012 - after some research, I can't find an 'official' rule against multiple data items on a flow, but they are nevertheless VERY rare. In one nice slideshow on data flow diagrams I found an example of two data items on one arrow - but that was a higher level DFD, and the two data items were split up into two arrows in the lower level DFD that showed more detail. 2. Aren't double-headed arrows forbidden in DFDs? UPDATE - 28 June 2012 - Yes. Data flows can only go in one direction! 3. Why are two arrows unlabelled? Did someone change the DFD rules when I wasn't watching? For the process 'Determine deadlineTime & cduBattery' she has developed the following algorithm. It updates deadlineTime and cduBattery in cduFile. The variable currentTime is set by the system and represents the current time of day in 24-hour time.
|
||||||||||||||||||||
Question 5 The structure of cduFile is shown in the table below. Using the information in the DFD, the algorithm and case study, complete the table to indicate the most appropriate data type for each field. Select from: integer, floating point number, Boolean, array, string.
The deadlineTime data type is awkward. The most efficient type would have been 'time' but that was not allowed. Storing it like "1345" meaning 1:45pm is also clumsy and requires processor-intensive parsing. It would be far better to store it as a number of seconds since midnight, which comfortably fits in a short integer. 4 marks State average was 74% Only responses from the provided list were accepted. The VCE Software Development Study Design states the following data types: integer, floating point, Boolean, character and string. It is important that students undertaking IT Applications and Software Development are aware of the differences in each study's definition of data types. |
||||||||||||||||||||
Question 6 The updateCduFile algorithm uses a function called bayNumFind. It will search cduFile for the bay number that matches the given cduID. a. Kirsten plans to use a binary search in the function bayNumFind. cduID has to be sorted from smallest to largest. 2 marks State average was 28% Most students were able to identify that the file needed to be sorted in order to perform a binary search; however, many failed to identify the data item that should be sorted – cduID. b. Kirsten can choose to have cduFile either as a serial file or a random file. Which should she choose and why? Choice - Random file. Reason - Records in a random file can be retrieved far more quickly than those in a serial file because the starting byte of any record can be calculated with a simple calculation because every record has the same length. Serial files do not have to have their field lengths pre-defined, so their contents can be far more flexible than a random file, but one has to seek from the start of the file through each record until the required one is found. 2 marks State average was 40% Only a small number of students were able to adequately give a reason why a random file was better than a serial file in this instance. Random access files allow direct access to required records/data, so every record does not need to be read to find it as is the case with a serial file. |
||||||||||||||||||||
Question 7 For the process 'Determine overstay bays' Kirsten has developed the following algorithm. It goes through every record in cduFile and finds any that have overstayed. There is one record per parking bay. Normally currentTime is set by the system, but for testing purposes Kirsten will set it to 1300 (1.00pm). To properly test the algorithm, Kirsten believes she will need to have four different values for deadlineTime. Complete the table below with samples that test the algorithm. State which line is being tested.
8 marks State average was 41% In this question students needed to identify key boundary conditions that would test the algorithm logic. Many students confused the variables deadlineTime with currentTime. An overstay message should occur if the deadline time was prior to 1300 (1.00 pm). Students should be given the opportunity to demonstrate these skills in testing tables throughout the year. Creating their own test tables for assessment is not sufficient; sample algorithms with and without errors and practice questions from past papers should be completed where appropriate to ensure students are well prepared for these types of questions. Kirsten now works on the mobile phone software. This software will be responsible for the three use cases associated with the parking officers.
|
||||||||||||||||||||
Question 8 Messages containing overstay parking data are sent from the dedicated council computer to the mobile phone of the parking officer in the area. The phone software must process the messages in the order they are received. Choice - Queue Justification - A queue stores incoming data and releases it in the order in which it arrived. A stack (usually) releases that last datum that arrived most recently, which is not the desired behaviour in this case. 4 marks State average was 59% The majority of students were able to identify queue as the correct data structure. It was clear that students had covered
this material well as they were able to articulate the fundamental difference between queues and stacks, that being the
order is which data is handled – first in first out (FIFO) for queues versus last in first out (LIFO) for stacks. In this case
the tickets needed to be processed as they were received, so a queue was required. The following is an example of a high-scoring response. |
||||||||||||||||||||
Question 9 When the parking officers arrive at the parking bays they will enter the car's number plate into their mobile phones. The software must check that each number plate entered is in the correct format. Then each number plate is sent to the dedicated computer. Kirsten has proposed the following algorithm. The number plates can only contain numbers and letters and be no longer than 6 characters. The function length() is used to find the number of characters in a string. I love the image of parking officers removing number plates from cars and entering them into their mobile phones.
*Thanks to Melanie for pointing out that because the test data is 6 characters long (not < 6), it fails the first IF test and drops down to the second numberPlateValid = False line without even checking for invalid characters. I'm not sure the examiners intended this. Were they, I wonder, if thinking that the actual outcomes were (1) valid, (2) invalid, (3) erroneously valid as I originally did? 4 marks State average was only 18% !! When completing a testing table, students should ensure that the expected outcome and actual outcome are based directly on the algorithm in the case study. Many students wrote words such as 'true' or 'invalid', which showed understanding but did not reflect the messages displayed by the algorithm. b. Describe the error that this test data shows. It automatically rejects number plates that are 6 characters long and does not even check them for valid characters. 1 mark State average was 40% The algorithm had one error based on the testing table: it does not check the length of the number plate correctly. A number of students responded with 'logical error'; however, the question required a description of the error shown by the test data. c. Write down the line of the algorithm that has caused this error. If length(numberplate)>0 and length(numberplate)<6 then 1 mark State average was 50% The line of the algorithm that has caused the error was: If length(numberPlate) >0 And length(numberPlate)<6 Then This question asked students to write the line of the algorithm with the error. Students are encouraged to write the whole line of the algorithm, rather than parts of the line or creating line numbers for the algorithm. d. Write down the line as it should have been written. If length(numberplate)>0 and length(numberplate)<=6 then or If length(numberplate)>0 and length(numberplate)<7 then 1 mark State average was 45% The majority of students found this question challenging. Algorithms and testing are both covered in two of the four Areas of Study and students need to develop their understanding of each. Students should practise these types of questions either in classroom activities using past examination papers or in assessment where appropriate. |
||||||||||||||||||||
Question 10 Kirsten is concerned about the storing of offenders' details if parking officers lost or even left their mobile phones on their desks at work. State two features Kirsten should build into the mobile phone software to ensure that the data in the parking officers' mobile phones is secure. For each feature, explain how it would help secure the data. Feature 1 - password-protected login Explanation - prevents unauthorised people using the software Feature 2 - encryption of stored and transmitted data Explanation - prevents unauthorised people 'sniffing' data travelling wirelessly. Also prevents people being able to read data stolen from the device's storage. 4 marks State average was 69% Students' familiarity with mobile phones was in some cases a limitation to them providing accurate responses to this
question. A number of students simply described a list of mobile phone safeguards – for example, a timed screen lock– rather than what should be built into the software to ensure the security of the data. The following is an example of a high-scoring response. |
||||||||||||||||||||
Question 11
The names would be meaningless and would require constantly referring to a data dictionary to find out what the variables and procedures contained or did. It could also easily lead to errors by using the wrong variables. 2 marks State average was 50% Students needed to demonstrate an understanding of efficiency in their explanation. According to the study design
glossary 'measures of an efficient solution include the speed of processing, the functionality of the solution, the ease of
use of the solution …' Full marks were awarded to responses that focused on processing and ease of use. The following is an example of a high-scoring response. b. State one other action, besides using meaningful names, Kirsten could perform to make her program code more programmer friendly. Lots of useful, relevant internal documentation. The following is an example of a high-scoring response. 1 mark State average was 75% Most students were able to show that a naming convention and internal documentation were essential elements for the maintainability of the code by the programmer or a future programmer, and that variable length had little, if any, impact on the efficiency of the software. |
||||||||||||||||||||
Question 12 During the development of the software, Kirsten finds a module developed by the Fast Fines company. If she could use this module she would not have to develop the module herself. Explain Kirsten's legal obligations if she wishes to use this module. The Copyright Act (1968) says she would need to obtain permission from the owner of the intellectual property before using the code. 2 marks State average was 65% Some students failed to provide a detailed response to this question. Students should ensure that they read questions
carefully and provide sufficient depth and detail in their responses to ensure the question is answered as asked. To gain
full marks students needed to make reference to the legal obligation, namely intellectual property through copyright,
and an action that could be taken in order to act legally such as seeking permission or paying a fee for copyright
permission. The following is an example of a high-scoring response. |
||||||||||||||||||||
Question 13 Kirsten is sure that all of the errors are now out of the software and that it is ready to be used by the Bigton City Council. The final testing process is to complete the User Acceptance Testing (UAT), but James is not entirely sure what this is and how he will be involved. a. Explain the process of UAT and how James and the other staff will be involved. UAT is testing the opinions of people who will actually use the software once it is released. This is important because these people will have to use it, and can offer valuable feedback from a experienced user's point of view. It is not done by developers, who are too close to the system and may not see its faults, or managers who would be unlikely to know what is important from a regular user's perspective. 3 marks State average was 47% Most students struggled to provide a detailed response, limiting their responses to statements about 'checking the
system does what is intended'. In addition, many students confused user acceptance testing (UAT) with evaluation. For full marks students needed to address what is involved in user acceptance testing, James' role in this and how other
staff would be involved. The following are examples of high-scoring responses. A UAT is the process of finding out if the software meets the requirements and the expectations of the end user. The parking staff will be involved in testing the mobile software and each of the other staff members will test if their section functions correctly. Once testing is completed the staff will report back to Kirsten any problems. b. Provide an example of a criterion that the new PIMS must meet to pass the UAT process. It must be easy for the parking officers to use. 1 mark State average was 45% A variety of responses, including their form, were appropriate to this question. For example, some responses stated a
criterion in terms of a question; others identified if the criterion was a measure of efficiency or effectiveness and then
provided an example. |
||||||||||||||||||||
Question 14 To evaluate the success of the PIMS, Kirsten needs to collect a range of data.
She would not get a car to enter/leave a bay and leave it there for various times, and observe whether tickets were issued by the system - this would be testing, not evaluation. 3 marks State average was 33% This question required students to suggest a strategy to evaluate the accuracy of the parking fine issued. A number of students missed the key word 'accuracy' and provided a general answer. As in previous years many students found it difficult to develop a strategy. A strategy is a method by which an activity is carried out; this would include a set of steps or procedures, i.e. What will be done? When does it happen? Who does it? etc. Evaluation questions can be found on previous exams and these questions should be used as appropriate in classwork and in assessments. For full marks responses needed to consider what data needed to be collected, who was collecting it and from where,
and what type of information was being generated to measure the accuracy of the solution. The following are examples of high-scoring responses. Kirsten may wish to count the number of complaints from motorists in relation to being overcharged in their parking fines. If this
number is lower than the previous system then it is an indicator of success although it should be noted that more parking fines
are likely to be issued with the new system increasing error amounts. |
||||||||||||||||||||
Question 15
The case study does not say how many officers need training. If there are not too many (e.g. a dozen or fewer), they could be trained in a single group with practical hands-on experience. 2 marks State average was 65% Most students were able to provide a reasonable response to this question. Student generally responded with, 'train the
trainer' or 'onsite group training'; however, a range of responses were appropriate as long as they were applicable to the b. Suggest how the Council could measure the suitability of this program. They could test trained officers in the use of the system and see how many mistakes the officers made. If trained offers used the system accurately and quickly, the training would be considered a success. 1 mark State average was 40% Suitable responses included a method of data collection (for example, a survey, interviewing, a written test or
observing) and what was to be collected (for example, questions such as was the training sufficient or who was the data
to be collected from – the parking inspector) or when this would occur (for example, at the conclusion of the training
program).
Many students misread the question and assumed the word 'program' was the software implemented, not the training |
||||||||||||||||||||
Question 16 The introduction of the new PIMS at the Bigton City Council will affect a number of stakeholders. Outline the conflict that may occur between the Council and each of the following stakeholders. Parking officers If fewer parking officers are needed with the new system, some of them might lose their jobs. This would cause a considerable amount of stress and hardship. Some officers might resent having to learn a new system - especially some older experienced people who have used the old system for years. Motorists using parking bays Motorists might believe they are being watched by a 'Big Brother' and resent the intrusion. They might resent having their rates used to pay for a system that will fine them more efficiently! They might be annoyed that the new system is fining them for offences they never got caught for in the past (e.g. overstaying for a short period of time). 2 marks State average was 30% Most students found this question challenging, with many unable to clearly describe a conflict. An answer such as 'they may feel annoyed' was not sufficient. The following is an example of high-scoring response. Parking officers: The parking officers may resist the council's changes and be angry about the new system since they weren't warned or told why. This could result in for example, strike action or an increase in sick days. Motorists will complain that the council is deliberately attempting to raise revenue from PIMS and that the software is unfair/unjust.
|
||||||||||||||||||||
END OF QUESTION AND ANSWER BOOK |
||||||||||||||||||||
Back to the IT Lecture Notes index
Back to the last page you visited
Created 17 November 2011
Last changed: May 7, 2022 11:50 AM
Original Content © Mark Kelly 2010
Images and questions are © Victorian Curriculum
and Assessment Authority 2010.
Reproduced here with permission for educational purposes.
VCE Applied Computing Notes © Mark Kelly