VCE Applied Computing Notes by Mark Kelly
Software DevelopmentVCAA Exam Post Mortem2012 |
Post Mortem Notes This is not a VCAA publication.
I do not speak for the VCAA, the IT examiners, or exam markers. I was not involved in the writing or marking of this examination. Extracts from exams are all Copyright © VCAA, and are used with permission. Use these post mortems at your own risk. I reserve the right to change my mind completely, at short notice, about anything I've said here. Suggestions, discussions and corrections are welcome. Questions look like this. |
Other VCE IT Exam Post Mortems to enjoy IPM / ITA / Informatics / Data Analytics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2023
|
The Post Mortem Awards |
||
The SCHMACKOS award is given to questions that are a complete dog's breakfast. |
The Questions That Make You Sick As A Dog Award |
And the exciting Illiteracy Award. |
Written examinationFriday 16 November 2012 Reading time: 3.00 pm to 3:15 (15 minutes) Writing time: 3:15 to 5:15 pm (2 hours)
Materials supplied
Instructions
Students are NOT permitted to bring mobile phones and/or any other unauthorised electronic devices into the examination room. |
Examiners' report comments were added 5 June 2013. See the original 2012 SD exam report on the VCAA site. The multiple-choice questions were well done by many students. Areas of weakness tended to be the theoretical components of the study, such as control structures, design characteristics and the purpose of a software requirements specification (SRS). Throughout the year, it may be useful for students to practise answering questions based on these areas. In general, Section B required students to demonstrate sound theoretical knowledge and to provide detailed and accurate responses. In 2012, this section contained two questions that asked students to apply their knowledge of pseudocode algorithms. The study design specifies pseudocode as the only algorithmic representation to be used as a method of expressing software designs. Many students appeared to welcome the challenge to demonstrate their skills in this area. The format of Section C was consistent with that of previous years and student responses were expected to refer to the case study. The key weakness of many responses in this section was the lack of depth and detail provided by students. During the examination, students should
|
SECTION A - Multiple-choice questionsInstructions for Section A Answer all questions in pencil on the answer sheet provided for multiple-choice questions. |
Question 1 Answer is B. The UCD describes how external entities interact with functionality within the system. It is very important that students thoroughly understand the problem-solving methodology (PSM). Use case diagrams are part of Area of Study 1, Unit 3, which focuses exclusively on the analysis stage of the PSM. 58% of the state got this right. |
Question 2 Answer is A. Interviewing the clients would not tell him what the agents need from the software, so rule out C and D. While watching one real estate agent might give detailed information on how they work, interviewing all 4 would give more information about their needs. 83% of the state got this right. |
Question 3 Answer is A. Trojans don't use any distinctive technology. They just masquerade as useful software to get users to install them. 78% of the state got this right. |
Question 4 I think the answer should be C. A code of ethics describes how people should behave morally, which makes A and B irrelevant. D is not an ethical issue, leaving C, which is a human matter. I interpreted option D as a simple argument about scope: should the program be expected to produce emails, for example - a trivial matter that would not use a code of ethics to sort out. I interpreted my preferred option C as a position where management might be (legally) exploiting work contracts to force programmers into working unfair hours or reducing their pay. That's where I thought a code of ethics could be used to prevent such exploitation. However, others have argued that <D> could mean that programmers are instructed to put ethically-unacceptable functionality into a program (e.g. a keylogger). That's valid. So there is a problem in the vagueness of "an issue". Since others and I can come up with different issues that satisfy options C and D, they both should be accepted by markers. The official answer (which was given no explanation in the exam report) was D. |
Question 5 Answer is B. Cabling can be expensive. The supposed extra security of wireless rules out C and D, which leaves you to focus on A and B, and since we know wireless is less secure than cable, A also goes. 81% of the state got this right. |
Question 6 Answer is B. Options C and D are far too high-level for the physical layer. Routing data involves the selection of direction, which is also high level - part of the internet protocol (IP). The physical layer is responsible for sending bits over a wire. 58% of the state got this right. |
Question 7 The algorithm above is tested with a number of inputs. Answer is D. The other options have at least one value that is less than or equal to 50. 89% of the state got this right. |
Question 8 Answer is C. This is defined in the study design. Don't get me started on why evaluation criteria can't (and should not) be developed during analysis, where the end result of the software is defined. Developing evaluation criteria is a logical task, not physical design. Grumble. Grrr. 75% of the state got this right. |
Use the following information to answer Questions 9-12. Lindsay is writing a program that requires the entry of the following data. |
Question 9 Answer is B. Clicking a radio button is quicker (more efficient) and guaranteed to generate valid (effective) data. The less typing a user does, the less chance there is of errors being introduced. 70% of the state got this right. |
Question 10 Answer is D. Comments are also known as internal documentation, for the programmers - not the software's users. 86% of the state got this right. |
Question 11 Answer is D. The IF structure selects an option. A sequence structure (alternative B) was incorrect because a sequence structure is a series of unconnected steps. This was clearly a set of steps to select a value (i.e. alternative D). 44% of the state got this right. |
Question 12 Answer is A. There is - as far as I know - no such thing as a limit check, but examiners have been known to come up with their own cute names for things we know by other terms. The code has already done a range check, so that's not it. The data does not have to be unique, leaving A - checking that the data is not text, for example. 61% of the state got this right. |
Question 13 Answer is A. The SRS analyses the problem so it can be better understood. B is user documentation; C is internal documentation; D is evaluation criteria. 49% of the state got this right. |
Question 14
Answer is C. Bubble sorts are quite easy to code, but become exponentially less efficient as the amount of data to sort increases. Quick sort is harder to code, but is quicker with large data sets. 80% of the state got this right. |
Question 15 Answer is D. This is a bit of a tricky one. We can safely eliminate weight as a factor for a programmer to worry about; after all, what could a programmer do to address a weight issue (apart from eating less pizza, but I digress.) That leaves only C and D. The only difference between the remaining options is processor speed vs operating system, and the programmer can't do much about the processor speed, apart from try to code more cunningly if the CPU is slow. The operating system, however, is definitely going to affect the way a programmer works when coding because the OS may or may not, for example, support certain input devices (e.g. handwriting recognition) which would mean the programmer must seek alternative solutions. Alternatives A and B were not viable options because the weight of a mobile phone would not affect the programmer's coding. Memory size and screen resolution are both important considerations when designing games (images and clarity), but it is the operating system (option D) rather than the processor speed (option C) that will most affect the functioning of a games program on a mobile phone. Incompatible operating systems would render a program inoperable, whereas processor speed is likely to allow the program to run but at a lower speed. 34% of the state got this right. |
Question 16 Answer is A. A record is a structure that is defined by the programmer to contain a complete set of data fields of different data types. B and C only exist on disk, not in memory as the question insists. A 1D array can store a lot of data, but each entry has to be the same data type. Maggie has pointed out that PHP users could opt for record or array, since PHP can store different data types in a 1D array. I hope the markers are aware of that aspect of PHP! It's a pity that PHP students can't explain their answers in section A. 58% of the state got this right. |
Question 17 Answer is A. The ISP and equipment suppliers are irrelevant. Joanne is a stakeholder because she must pay for the extra programming. Her customers are stakeholders because their financial data is potentially at risk of being revealed. The software developer is a stakeholder because he/she is making money from the work, and could potentially get into professional trouble by deliberately releasing substandard software. 66% of the state got this right. |
Question 18 Answer is B. The error logs would help explain what was happening at the time of the crashes. Options A and B could conceivably solve the problem if it were caused by hacking, but they would not identify the cause of the crashes. Listing all the software on the network would not, probably, yield an answer either. 73% of the state got this right. |
Question 19 Answer is A. Documentation is the common fault in the other 3 options. You don't need to know a lot about project management for SD, but you need to know option A. 61% of the state got this right. |
Question 20 Answer is C. Data security always trumps other factors. 87% of the state got this right. |
Overall for section A - a decent set of questions. Not too easy, not too hard. A Goldilocks collection. Well done, examiner. Good dog! For those correct-answer counters out there, there were 7 A's, 5 B's, only 3 C's and 5 D's. |
Instructions for Section C Answer all questions in the spaces provided. Remove the case study insert and read all the information provided before you answer these questions. Answers must apply to the case study. |
||||||||||||||||||||||||
Having obtained agreement about the overall system, Ilma carries out a full analysis. She will document this in a software requirements specification (SRS) and give it to the team to make sure they agree with her analysis. Question 1 The data collection section of AQADAS has a number of non-functional and functional requirements. a. Identify the most important non-functional requirement. 1 mark It must be portable. Even though a range of responses was accepted, one of the most important non-functional requirements is 'ease of use'. Average mark 40% b. Identify two important functional requirements. 2 marks
This question asked students to identify what AQADAS is required to do and should be able to do. There was a range of functional requirements that students could have identified, including 'facilitate entry of symptoms', 'obtain air quality measurements', 'obtain location and time' and 'keep data for up to 24 hours'. Average mark 25% c. Identify one important functional requirement that a mobile phone alone cannot provide. 1 mark Measuring levels of air pollutants. Even though obtaining air quality measurements may be a functional requirement, it is not something that a mobile phone can do without additional hardware/software. This question asked students to analyse the case study and identify solution requirements – both functional (what it is required) and non-functional (the solution attributes, such as user-friendliness, response rates, robustness, portability, reliability and maintainability). Many students were unable to write solution requirements, and confused functional and non-functional requirements. Average mark 50% |
||||||||||||||||||||||||
Question 2 Ilma begins to draw a context diagram (below) so that it is clear where AQADAS will get its data from and to whom it will provide information. Based on the case study, including the data flow diagram (DFD; Diagram 3), complete the diagram for Ilma. 3 marks This was trickier than I thought. I first just attached the symptom_data arrow to the CASSA external entity and thought, "3 marks... but I've only added 2 things, the data flow and the label. How are they going to mark this? I must be missing something." Another read of the case study made it clearer. I was treating the CASSA unit and the mobile phone as a single entity, but the phone should be considered a separate entity responsible for the symptom data. The new entity, the data flow arrow and the label accounted for 3 marks. The moral of the story: when you have an indeterminate number of things to add, use the marking scheme to guide you to how many items are expected. 19 Nov 2012 - Our friend Kevork has pointed out an interesting issue with this context diagram. It shows CASSA providing sensor data directly to AQADAS, but the DFD clearly shows CASSA's data going to the phone for collation and transmission. We all know data flows between external entities do not appear in CDs or DFDs, so strictly speaking the CD is wrong. VCAA might say that CASSA provides data to AQADAS and the phone is just an intermediary, but the phone does have to collate the data... Hmmm. Interesting. What do you guys think? Many students were not able to complete the context diagram provided. Students should have carefully read the case study stimulus material that was provided in the insert since it contained a data flow diagram (DFD) that would have assisted them with completing the diagram. A significant number of students identified the 'mobile phone' as an external entity, when in fact it should have been 'asthmatics'; they provide the data. The mobile phone is the collection device and thus not included on a DFD. Yep, in retrospect I'd agree with that. Change 'Mobile phone' to 'Asthmatics' in the DFD above. Average mark 36% |
||||||||||||||||||||||||
Question 3 Ilma thinks that her non-computer-science colleagues might not understand technical diagrams, so she decides to include a use case diagram in her SRS. Most of the diagram is drawn below.
A. labelling the un-named actor in the diagram. 1 mark Asthmatics.
The first use case can be determined because in the DFD the first process after the data arrives is validation. The second one was trickier. I originally had "Record symptom data" because it matched the equivalent communication line coming in from the CASSA actor. Heath, however, suggested it could be the collation process since it passes data including the phone_id, which is not mentioned earlier, which suggests that the phone_id is fetched by the collation process and not when recording symptom data. Students had difficulty identifying the correct use cases (set of tasks that the system must carry out), with many identifying the mobile phone as the actor (role) rather than the asthmatics. Average mark for 3a and 3b - 40% |
||||||||||||||||||||||||
Question 4 From the DFD in the case study, list the processes that have to be included in the software solution for the mobile phones. 1 mark 1,2,3,4. Funny... only one mark for several processes listed... but two marks for question 3b. Do students get two-thirds of a mark if they only found 2 of the points above? This involved clearly working out in the DFD geographically where things were happening in the system - in the phone or in CASSA. Few students were able to identify the correct processes from the DFD. These were This information was taken directly from the DFD in the case study insert. Students could have written the numbers 1, 2, 3 and 4 or written out each process in full as above. The order was not important. Average mark 10% |
||||||||||||||||||||||||
Question 5 After reading through Ilma's SRS, Anton suggests that it might be a good idea to implement the system as a virtual private network (VPN). a. Briefly describe a VPN. 2 marks It's a secure, encrypted connection ('pipeline') to communicate from outside a LAN to within the LAN using the standard internet infrastructure. This question, needing a technical description, was well answered by many students. However, it is disappointing that many students do not score any marks for this type of question. It is important that students are able to provide technically accurate descriptions. The development of a glossary of technical terms throughout the year may assist students with these terms. Answers should have referred to a VPN being a private network that uses public infrastructure and that access was gained through authentication security protocols. Average mark 55% b. Do you agree or disagree with Anton's recommendation? Justify your answer. 2 marks I agree. The VPN's encryption would safeguard the sensitive medical data being communicated, and the VPN's use of standard internet infrastructure means they don't need expensive dedicated communication lines. Students were required to agree or disagree with the recommendation to set up a VPN. They also needed to ensure that reasons were provided, applicable to the case study, to justify their contention. An example of an acceptable answer for supporting a VPN is the increased security will better protect the privacy of asthmatics. An acceptable answer for opposing a VPN is the additional cost to the research project of setting up authorisations. Average mark 50% |
||||||||||||||||||||||||
Question 6 Ilma is about to begin the design and development of the software when Dr Fischer receives an email from the university's legal department, reminding him that there are some legal obligations that must be complied with by the software developer. concern 1 Under the Health Records Act (Vic) 2001, the developers have a responsibility to safeguard the health and medical information of the volunteers, and protect it from misuse, damage, loss or unauthorised access. She can encrypt stored data, and protect data during communication using SSL or TLS or a VPN. concern 2 Under the Copyright Act 1968, the developers must ensure if they use other people's programming code that they respect the intellectual property rights of its authors. She can either use no other person's code, or contact the authors to get permission to use it, or pay for the rights to use it. Don't forget to do the second bit of the question, describing what she can do to deal with the concerns. That accounts for half the marks, and is easy to overlook when focusing on identifying the laws. This question contained two parts: discussing the concerns and then describing what could be done to deal with the concerns. Many students overlooked the second part of the question. 'Ilma needs to make sure that the data she collects through the use of her design is only collected once the users are made aware of what their data will be used for and what they will be collecting and then agree to these terms and conditions. She can assure this by asking permission of the user before collecting the data.' ' To obey the Privacy Acts, the medical data sent by the asthmatics must be protected and secure. This can be achieved by encrypting the data when transferring it, and making sure the file storage is protected, both physically and logically, e.g. locks and guards at the university, and a firewall along with antivirus, anti spyware and passwords on accounts that can access the data.' Average mark 53% |
||||||||||||||||||||||||
Question 7 The application software on the mobile phone will cause an air quality measurement to be taken every five minutes. As shown in the DFD, the air quality data will be stored in the data store accumulated_air_quality_data. Since only 24 hours of data is needed, after each measurement is taken any air quality measurement that is more than 24 hours old will be deleted. data structure a sequential data file justification In 24 hours, there would only be 288 records to store (24 * 12 per hour), which is quite a modest quantity of data. A sequential text file would be very easy to code and it would not require the superior retrieval speed offered by a random file which comes at the cost of fixed-length records (which can be wasteful of space) and increased coding complexity. Alternatively does the data store need to be in a file at all? This relatively small amount of data could be stored in RAM in records containing 4 numeric pollutant readings + location code + time + date fields. The study design's key knowledge refers to data structures as being (with my emphasis) Others have said that it should be a queue. I'm not so sure. A queue keeps incoming data in order so it can be processed in order, but the DFD shows the pollutant data is stored with its timestamp, so the data need not be stored in any particular order: they could be sorted and processed using their timestamp. So files, records and queues are on the agenda. Which is right? The markers should be able to accept any of them with a reasonable and relevant justification, IMO. Even though there is considerable information provided in the case study insert, students need to ensure that they carefully read any of the additional information provided within each question. This additional information is often used to prepare or guide the student when analysing the situation and may help them narrow their possible responses. Students should have knowledge of the following data structures: one- and two-dimensional arrays, records and files, stacks and queues. In this question, information was provided about what data would be stored, when it would be stored, for how long it would be stored and in what order it would be deleted (oldest deleted first). This information was to be used to select a suitable data structure (from the above list). Many students had difficulty identifying a data structure and used programming terms that were not data structures. Students should have identified a queue as the appropriate data structure, described it as 'first in first out' and explained that a stack, being 'last in first out', was not appropriate in this situation (as the first data in was what should be removed). Average mark 30% |
||||||||||||||||||||||||
Question 8 Maria is given the task of designing the user interface to be used on the mobile phones. The SRS has the following specifications.
Maria has been advised that some asthmatics will enter this data during or immediately after an asthma episode, so the user interface needs to ensure that the data is captured efficiently and limit the chance of errors. The sketches marked Design 1 and Design 2 in the case study insert show two designs that Maria has created for this interface. a. Identify one important technical consideration that has affected the two designs of the user interface. 1 mark
The screen size and input/output methods were the most common and appropriate technical considerations that affected the design of the user interface. Average mark 50% b. For both Design 1 and Design 2, explain one advantage of each that makes that design the more efficient and/or effective method of data entry for the asthmatics. 2 marks Advantage of Design 1 Less user activity (tapping) is involved because all of the necessary controls are visible and don't need a separate tap to reveal them : 10 taps for a complete record using design 1 compared to 17 for design 2. Advantage of Design 2 It takes up less screen space, which is advantageous for phones with lower screen resolution. Some accepted advantages of the designs include the speed of Design 1, as the user just touches options that are already displayed on the screen, and the compactness of Design 2 means it is less likely that the user would have to scroll or swipe through the screen to get to all data entry points. Average mark 85% c. Of the two interface designs provided, select and justify the better option for the AQADAS system. 2 marks Question C16 says that asthmatics are given a phone, so the study could select a phone with a tall aspect and be sure that the interface will fit it. In that case design 1 will be preferable. As Kevork has added, being able to see and review all of your selected answers at once would be better than having them all hidden in submenus. However, if the asthmatics used their own variety of phones and screen sizes, it would have been better to design conservatively and use design 2, which all phones would have been able to display. While some phones would have the height to accommodate design 1, many would not and users might have to scroll the display up and down to see the entire interface. If, during reading time, students had not noticed this information in question 16 about the phones being provided by the university, they might have given a very different answer here. The moral of the story is that later questions can inform earlier questions. 19 Nov 2012 - Kevork has been pointed out that it is unfair to expect students to use information from a later question to correctly answer an earlier one. I agree. Students should be able to rely just on the information provided SO FAR to answer a question. They should not have to take 'future' information into account. Bad examiner! Bad! Students should have provided a response that examined the two options and included a reasoned explanation of their choice. Either design could have been selected. Average mark 75% |
||||||||||||||||||||||||
While Maria is designing the user interface for the mobile phone, Ilma starts to work out how to store the data in the university's file server. There will be a large amount of air quality and symptom data sent to the university by asthmatics. The researchers will also need to store personal data about the asthmatics. Ilma decides to put the data in two separate files: SymptomAirQualFile and AsthmaticsFile. To link the two files, each asthmatic will be given a code number. | ||||||||||||||||||||||||
Question 9 It is decided to have the asthmatics fill out a standard form so that the large amount of personal data can be entered efficiently. This data will then be entered using Optical Character Recognition (OCR). Unfortunately, this can produce a number of errors and, where possible, Ilma wants the software to validate the data before it is stored in AsthmaticsFile. Data types: integer, floating point number, Boolean, character, string
The majority of students handled this question well. Students had to correctly state the data type and the reason for each listed data to score one mark. Average mark 70%
|
||||||||||||||||||||||||
Question 10 To check that the postcode for the asthmatic is valid, the function below is written. To be a valid Victorian postcode for a residential address, it must be a number from 3000 to 3999. The function is called after validating that the postcode has been entered and is a number. Function CheckPostcode(postcode) a. Complete the table below by giving four values of a postcode that would test the function and give a reason for selecting each. These values together should give a broad test of the function. 4 marks
This is another example where the stem of the question contained valuable information that assisted with answering the question. The function 'check postcode' validation had already occurred to ensure that a four-digit number was entered. The function performed a range check and required the boundary conditions to be tested. b. Not all numbers between 3000 and 3999 are used as postcodes in Victoria. Ilma decides to include a function that checks whether the entered number matches a postcode that is used in Victoria. How is this type of validation best described? 1 mark A range check to ensure the supplied postcode is in a list of valid postcods. There are only 3 usual validation contenders: existence, range and type. Since the question says that type and existence have already been applied, range is all that is left. Checking to see that data exists within a limited list (e.g. days of the week, states of Australia, the names of Santa's reindeer) also fits under "range check" - but don't confuse "existing within a limited list" with an existence check.An additional validation is recommended, which checks if the postcode is a valid Victorian postcode. Students were asked to state how this would best be described. The question did not ask for the name of the validation technique that was suggested. One way of describing this test would be, 'it checks if the postcode is contained in the list of valid Victorian postcodes'. A range of other responses was accepted. Average mark for 10a plus 10b - 52% |
||||||||||||||||||||||||
Question 11 Dr Fischer has decided that he wants an equal number of males and females involved in this study. Ilma writes the following short procedure to calculate the number of male and female asthmatics already entered. Begin a. To check the algorithm, the values F, M, F have been entered into AsthmaticsFile. Working space (25% of a page) It's good to see some working space provided!
This is how I handle deskchecks with looping values. Beside each line of code I put the current values of variables as they are calculated. Each extra column shows a new iteration of the loop. It works for me and avoids simple but significant errror.
1 mark Students were required to consider a presented algorithm, check its logic and identify the error. To support students, working space was provided so that they could draw up a draft table to desk-check the algorithm if required. It was encouraging to see that many students utilised this space. Average mark 40% b. Unfortunately, when Ilma runs the procedure the results show that it is not working properly. numMales + NumFemales should equal NumAsthmatics To get the one mark for this question, students needed to provide a response similar to: 'The value displayed for the number of females is wrong. The number of females is one fewer than it should be. The expected values should be: Average mark 40% c. Explain how this error could be corrected. As part of your explanation, write in full the pseudocode statement(s) to which you are referring. Do not use line numbers. 2 marks The line "NumAsthmatics NumAsthmatics + 1" should update the NumAsthmatics count before the line " NumFemales NumAsthmatics - NumMales." The line of pseudocode statement(s) that needed correction/editing was An appropriate explanation related to the line of code could have been as follows. Students needed to suggest one of the ways that worked. There were other appropriate suggestions. However, the key to correcting the algorithm was to ensure that the number of females is calculated after the total number of asthmatics is increased. Average mark 40% |
||||||||||||||||||||||||
Question 12 It will be necessary from time to time to update personal information for some of the asthmatics. It is thought that this will need to be done no more than three times a month for the life of the project. The code used to uniquely identify each asthmatic will be a simple number starting at 0001 and increasing to 1500. There are two possible ways that the AsthmaticsFile can be organised, either as serial access or as random access. Ilma decides to use a random access file and use the asthmatics code to retrieve the record. 1. Random file access can be far faster that serial access since the starting point of records can be calculated mathematically and a record sought immediately without have to read all the intervening records. 2. Changing a record in a random file is as simple as locating it and writing its new values in its existing position (which is possible since all records are the same length). A serial file can only add records at the end of the file, so to change (say) record 5 of 1000, you must read the first 4 records from the existing file, write them to a new file, write the altered record 5, then read the next 995 records from the original file and write them to the new file. Then the old file needs to be closed, deleted, and the new file renamed with the original file's name. Random access versus serial access has appeared in a number of examinations over the last few years. However, students still found it difficult to express their response in a detailed and clear manner. An appropriate response would have included comments about ease of reading and/or writing random access files, would have compared these to serial access and would have indicated why random access was appropriate in this scenario. For example: A sequential file would require the whole file to be read each time and then, after making the alterations, the whole file would have to be rewritten. With a random access file, you can read just the record that you require and rewrite just this record. In this case, you have the asthmatics code, which could be used to identify the record in a random file, so access is no problem. You are doing this only infrequently, so you do not want to have to read the whole file, just the record that you are interested in. Hence, random access would be much faster. Average mark 35% |
||||||||||||||||||||||||
Question 13 The records in AsthmaticsFile will be kept in asthmatics code order (from lowest to highest). It will be necessary to find individual records by using the asthmatic's name. Anton suggests using a simple linear search, where you start at the first record and read each record until you find the one you want. Maria says that for 1500 records this will be too slow and argues that they should use a binary search. Since the data is sorted by code rather than name, it will not allow a binary search by name because the names are in random order. A linear search is the only alternative. In this question, students needed to indicate that a linear search (Anton's suggestion) was more appropriate and justify it by explaining why a binary search would not work in this situation. The question required students to have in-depth knowledge of the binary search technique. In the AsthmaticsFile, the records are not ordered according to the asthmatic's name, so a binary search will not work as it requires the records to be ordered in the field you are searching and the researchers plan to find records by using the asthmatic's name. Average mark 15% |
||||||||||||||||||||||||
Question 14 Before Ilma can announce that the mobile phone software solution is ready to be used, she needs to go through the process of acceptance testing. a. Who else should be involved in the acceptance testing?1 mark Dr Fischer (the programmer's client) This is potentially ambiguous: does it mean acceptance testing by the customer (Dr Fischer) or user acceptance testing (by a typical end-user, like an asthmatic)? Some people use the term "acceptance testing" to mean "user acceptance testing." The last part of the next question offers a clue that Dr Fischer is indeed the person being referred to in this question. The moral of the story: if you see the same key knowledge apparently being examined twice, consider whether you got one of the two things mis-identified! Many students read this question as an evaluation question when, in fact, it covered acceptance testing, which occurs in the last part of any development prior to implementation. Typically, the key personnel in acceptance testing is the client – meaning Dr Fischer or the research team. b. The table below shows three criteria that should be tested. Outline a technique for obtaining information about each. 3 marks
This last one is definitely user acceptance testing, which strengthens my guess that the earlier question does refer to (client) acceptance testing. When describing a technique, students should indicate who the stakeholders are, what data will be collected, the method of collection (survey, observation, etc.) and how this will be used to check against criteria/requirements. There were many possible responses. Average mark for 14a and 14b - 20% |
||||||||||||||||||||||||
Question 15 Anton is preparing user documentation that will be provided to the 1500 asthmatics in the asthma study. He has proposed the development of a printed user manual that outlines how to use the software, the mobile phone and the sensor that is provided to the asthmatics. However, Maria has suggested that an electronic guide that is stored on the mobile phone would be a better approach. a. Outline two advantages of a printed manual over an electronic guide. 2 marks
It's hard coming up with 2 advantages! Average mark 75% b. Outline two advantages of an electronic guide over a printed manual. 2 marks
Average mark 80% c. Ilma has looked at both of these options and is not happy with either of them. Put it on a website. On the larger surface area of a computer monitor, the text will be more readable. It will retain all the advantages of being electronic, as shown above. Most students were able to provide appropriate examples of the advantages of a printed manual, including that it is simple and easy to use, can be used without knowledge of the phone and can be used when there is no power for the phone, and the advantages of an electronic guide, including that it is always available, easily updated and it is easier to search for information that you need, plus cheaper. Average mark 60% |
||||||||||||||||||||||||
Question 16 Asthmatics in the study will be mailed their pack one month prior to the commencement of the research. The pack contains their mobile phone (with the software solution pre-installed), the sensor and user documentation. The research team has insisted that all users of the system be provided with appropriate training in the use of the software module and the use and care of the sensor. The team also wants the asthmatics to undertake a short quiz at the end of the training to ensure that they have developed the necessary skills and knowledge to use the software and equipment. All of the training must be completed within four weeks of the asthmatics receiving their packs. As the 1500 asthmatics are located across all of Victoria, this will be a very difficult task to organise. Outline the most suitable training strategy that will allow all 1500 asthmatics to undertake the necessary training and meet the requirements set out by the research team. Justify your strategy. 4 marks The most feasible option is online training, using multimedia tutorials on a website. Such training can be entertaining and responsive to users' actions. It can also do the testing and assessment of users' skills. Any other option would be too slow, difficult or ineffective: group lectures would force many people to travel long distances; one-on-one training would be far too slow, even if it would be very effective in catering for individual needs; train-the-trainer won't work because there are no groups for the trainer to go back and train. Many students found it difficult to develop a training strategy. A strategy is a method by which an activity is carried out. This would include a set of steps/procedures covering what will be done, when it will happen, who does it, etc. In their training strategy, students should have included the following
Average mark 48% |
||||||||||||||||||||||||
On the whole - a good paper! Me gusta! |
||||||||||||||||||||||||
END OF QUESTION AND ANSWER BOOK |
||||||||||||||||||||||||
Back to the IT Lecture Notes index
Back to the last page you visited
Created 18 November 2012
Last changed: May 7, 2022 11:58 AM
Original Content © Mark Kelly 2012
Images and questions are © Victorian Curriculum
and Assessment Authority 2012.
Reproduced here with permission for educational purposes.
VCE Applied Computing Notes © Mark Kelly