VCE Applied Computing Notes by Mark Kelly
Software DevelopmentVCAA Exam Post Mortem2013 |
Post Mortem Notes This is not a VCAA publication.
Examiners' comments were published on 30 April 2014
I do not speak for the VCAA, the IT examiners, or exam markers. I was not involved in the writing or marking of this examination. Extracts from exams are all Copyright © VCAA, and are used with permission. Use these post mortems at your own risk. I reserve the right to change my mind completely, at short notice, about anything I've said here. Suggestions, discussions and corrections are welcome. Questions look like this. NEW! 2013 - warning signs for badly-answered questions!
|
Other VCE IT Exam Post Mortems to enjoy IPM / ITA / Informatics / Data Analytics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2023
|
The Post Mortem Awards |
|||
The SCHMACKOS award is given to questions that are a complete dog's breakfast. |
The Questions That Make You Sick As A Dog Award |
The Stamp of Approval for questions I like. |
The exciting Illiteracy Award. |
Written examinationFriday 15 November 2013 Reading time: 3.00 pm to 3:15 (15 minutes) Writing time: 3:15 to 5:15 pm (2 hours)
Materials supplied
Instructions
Students are NOT permitted to bring mobile phones and/or any other unauthorised electronic devices into the examination room. |
Examiners' report general comments Students generally performed well on the multiple-choice section.
|
||||||
SECTION A - Multiple-choice questionsInstructions for Section A Answer all questions in pencil on the answer sheet provided for multiple-choice questions. |
||||||
Question 1 | Question 1 In data flow diagrams, various symbols are used to represent different features. Answer is D. 82% of the state got this right. |
|||||
Question 2 | Question 2 A software project has been completed and the software solution has been running successfully for a few months. Simon is collecting all the documentation that was created during the project. In one of the documents he notices this statement: 'When executed, the program must occupy no more than 10 MB of main memory.' Answer is B. It's a (non-functional) solution requirement, and these are determined during analysis. Note: I've been asked whether it might be an evaluation criterion, which would be determined during design. If it were, it would be evaluated over time after implementation (as reliability or profitability would be), which does not seem to fit in this case. The question stresses that the statement was found after implementation, but that does not mean it was written about evaluation - it could easily have been written during analysis or design. A wise teacher, has suggested that the statement is a technical constraint and not a solution requirement nor an evaluation criterion, which sounds right to me. Peter deserves a virtual Schmacko. Interesting question: how do you tell the difference between a solution's non-functional requirement (e.g. 'it must be easy to use') and a solution's evaluation criterion (e.g. 'it must be easy to use') ? Could the statement have been written during either analysis or design, for different reasons? 50% of the state got this right. |
|||||
Question 3 | Question 3 Frank rings his computer-repair person. He explains, 'I'd just finished using a new application program that I downloaded from the internet and my computer suddenly went crazy. I shut my computer down and, when I restarted it, I noticed that all my photos had been deleted'. Answer is B. A Trojan is malicious software which could likely damage files, amongst other undesirable actions. 86% of the state got this right. |
|||||
Question 4 | Question 4 A program contains an object called person. The following line of code appears in the program. person.clearAll It causes all the data held by the object to be cleared. Answer is C. It's an action that can be applied to an object. The expression in the line "The part of the code after the point, clearAll, is most commonly called a" is VERY confusing. Why not say, "The part of the code after the word 'person' is..." ? Bad expression! 50% of the state got this right. |
|||||
Question 5 | Question 5 A program contains a data structure that can be visualised as shown in the diagram above. The program enters the values 5, 9, 11, 12 into the data structure in that order. Later, the values are read from the data structure in this order: 12, 11, 9, 5. Answer is A. A stack returns values in the reverse order in which they were entered. (First in last out). 82% of the state got this right. |
|||||
Question 6 | Question 6 A dictionary of computer terminology for secondary students has the following definition. Answer is A. An intranet is a closed, private system using HTTP and TCP/IP to share data across a LAN. 76% of the state got this right |
|||||
Use the following information to answer Questions 7 and 8. Freya is writing a short program to calculate the circumference of a large number of circles. She knows the formula is C = 2 r, where C is the circumference of the circle and r is the radius of the circle. She decides to name as myPi and set = 3.14, and use the variable names Circum for C and Rad for r. |
||||||
Question 7 | Question 7 For the program to be useful in all circumstances, Freya must ensure that the program treats Answer is D. Since either number could contain fractional parts, both need to be floating point. Instead of , shouldn't she set myPi to 3.14 - after all, how can you set a constant, universal value Pi () to 3.14, unless Freya lived in Indiana, USA?? Or is this meant to be an error by Freya rather than by the examiners? 74% of the state got this right. |
|||||
Question 8 Freya's program will read values for the radius from a file. It will write the answers to another file. Which one of the following algorithms appears to be the most efficient?
Answer is D. This is a cunning question. I like it. Many smartypants out there might have seen (B) and gone "Bingo!" and leapt to the next question, thinking "What's this "6.28" rot going on in the other options?" While all of the options would work, the best answer comes down to efficiency. (A) is the least efficient since it contains an invariant statement - it repetitively assigns the same value to myPi on every loop even though the value never needs to change. This dilemma between choosing tight code or readability has been with programmers for years. One strategy is to use simpler, verbose code while debugging, then optimise the code after it's working. The C family has often been criticised for the impenetrable nature of its code when its really tightly optimised. 31% of the state got this right! |
||||||
Question 9 Fast Ethernet is a local area networking technology. One of the standards it is based on is known as 100BASE-T, which specifies a 100 megabits per second transmission rate using multi-level signal encoding over a twisted pair cable. Answer is C. The study design says that the physical layer is really the only one you need to know, so the examiners will be unlikely to present a really specific question on any other OSI layer. 42% of the state got this right. |
||||||
Question 10 | Question 10 John is using a text editor to help write his program. A text editor is an example of a Answer is B. A nice easy question for the kids who would soon be drawing pictures of Megadeth or pussy cats in the margins of their incomplete exam answer booklets. A utility is an assistant program that helps with programming. Most programming environments are IDE (Integrated Development Environments) where the editor is built in with the compiler, linker and debugger as a unified whole. 75% of the state got this right. |
|||||
Question 11 | Question 11 The charts below provide some comparisons between wired and wireless networks. In the diagram Answer is C. You are asked to judge 3 criteria: speed, mobility and reliability. Wired networks will have higher speed than wireless, so eliminate options (B) and (D). Quick and easy. Another nice, novel question. It's good to see some creative questioning.
85% of the state got this right. |
|||||
Question 12 | Question 12 Pseudocode is used to represent Answer is B. 55% of the state got this right. |
|||||
Use the following information to answer Questions 13 and 14. A company has just installed a new software solution and has provided training for its staff. |
||||||
Question 13 | Question 13 By collecting data about how quickly certain tasks are completed, the company is evaluating Answer is D. The traditional efficiency/effectiveness definition question. It wouldn't be Christmas without it. Note: the users could be mangling every task they undertake, but the question is only concerned with how quickly they mangle them (efficiency) , not how much they mangle them (effectiveness). 80% of the state got this right. |
|||||
Question 14 | Question 14 Which one of the following is the best type of documentation to provide to users of this new software? Answer is A. These questions can be difficult, since they often force students to choose between two quite appropriate forms of documentation with the silly assumption that only one could be used. This question avoids that pot hole. Online help (A) would certainly help users. 67% of the state got this right. |
|||||
Question 15 | Question 15 A validation check used to ensure that entered data is a number is called Answer is A. Thank Dog they didn't repeat what they did in the 2012 ITA paper (question A2) and call it a "a required field check," a non-standard validation term understood by no-one but the exam writer. Well done, examiners 78% of the state got this right. |
|||||
Question 16 | Question 16 An application is designed that will record a person's heart rate every 10 minutes and keep a record of the heart rate readings for a week. What would be the functional requirements for this software? Answer is B. Functional requirements are those that need to be specifically programmed into an application so it can achieve a particular task. Non-functional requirements are qualities that the software must possess, but are not necessarily coded in. They could, for example, be achieved by effective design of an interface. In short, remember if you can say "The program must be able to..." followed by a verb - it's a functional requirement. In this case, reliability (A), ease of use (C), and being user friendly (D) are all non-functional requirement. 85% of the state got this right. |
|||||
Question 17 | Question 17 To review the security of a company's network, an IT technician could Answer is C. Options (A) and (B) would improve security, but not review past security performance. 89% of the state got this right. |
|||||
Question 18 | Question 18 Network technicians can use error logs to measure the Answer is C. Not a really challenging question. 81% of the state got this right. |
|||||
Use the following information to answer Questions 19 and 20. Jessica is setting up a home computer but, as yet, has no security measures installed. From home, she would like to securely access her files that are stored on her company's network. |
||||||
Question 19 | Question 19 Which one of the following provides the most secure method? Answer is B. 79% of the state got this right. |
|||||
Question 20 | Question 20 Jessica will need to protect the files on her home computer. She can back up and restore her files, but is unsure of the additional security measures that she requires. Answer is D. The question says she can already back up and restore files, so she does not need (A) or (B) which have more file recovery software. 71% of the state got this right. |
|||||
Overall for section A - a good set of questions. |
||||||
Case studyCASE STUDY INSERT FOR SECTION C Case study An organisation called the Protection of National Parks and Wildlife (PNPW) is responsible for monitoring the health of native animals and controlling wild animals across all national parks in Victoria. Currently this is achieved in three ways
As a result of recent budget cuts, PNPW needs to find ways to reduce its costs. The animal-monitoring stations are important and relatively inexpensive to run. However, the use of aircraft requires the hiring of several aircraft and pilots every week. Brenda Benbow, the manager of PNPW, has been working on a plan for using a drone (an unmanned aircraft) to monitor the native animals. This will cut down on the annual cost associated with the hiring of aircraft and pilots.
She has chosen a model that can pilot itself once it has been given simple instructions. This model is fitted with a standard micro-video camera, an infra-red camera and global positioning system (GPS) technology. It also has two communication channels: a standard wireless network interface card and a radio transmitter/receiver. The radio has a range of about 50 km. Each drone will be placed at a rural airfield. When a drone has to make a flight, it will be sent flight instructions from PNPW headquarters in Melbourne via a PNPW officer's notebook computer. The PNPW officer will then launch the drone from a car at the airfield. Once airborne, the drone will fly its preset patrol path. It can detect hotspots as small as 20 cm in diameter. This means that it can 'see' most wildlife. On detection of a hotspot, the drone will interrupt its preset patrol path, start monitoring the hotspot and pass control to a tablet computer at the nearest monitoring station. The drone will also transmit what it is 'seeing' to the tablet computer. The tablet will use wi-fi to communicate with the drone through the monitoring station's wi-fi router. The router uses the national park's communication system to communicate with the drone. The park rangers who are monitoring animals will then decide whether or not the picture shows an animal that requires further monitoring. Brenda has hired Drone Solutions to develop the software for the new Aerial Animal-Detection System (AADS). She has provided the company with details of the drone operation, the hardware resources contained on the drone and the requirements of the software operation. Software will have to be written for the computer at PNPW headquarters, the drone and the tablet computers to be used by the park rangers. END OF CASE STUDY INSERT FOR SECTION C |
Instructions for Section C Answer all questions in the spaces provided. Remove the case study insert and read all the information provided before you answer these questions. Answers must apply to the case study.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(3 marks) |
Question 1 (3 marks) Drone Solutions has determined that it has four months to develop the software solution for the Aerial Animal-Detection System (AADS). Melanie, who is leading the development team at Drone Solutions, has prepared a chart to help her monitor all aspects of the project. a. Melanie will use the chart to monitor the tasks required to complete the project. One of the major tasks she has scheduled on the chart is designing the AADS software. The exam should have bolded the word "two" in the question.
Note: This is a classic "What do you do during the PSM analysis phase?" question. Average mark: 1.2/2 (60%) Tasks that related to understanding/identifying the solution requirements, solution constraints and solution scope where appropriate.
b. In addition to monitoring the tasks required to complete the project, identify one other area that the chart should monitor. 1 mark [2 lines]
Note: This is a simple "What does project management monitor?" question, excluding "tasks." Average mark: 0.6/1 (60%) The chart could also monitor resources, people or time.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(5 marks) |
Question 2 (5 marks) Melanie has started a data dictionary for the context diagram (Diagram 4). It is incomplete. a. Complete the table below by writing the appropriate data flow names from the context diagram into rows 3, 4 and 6. 3 marks.
The examiners kindly completed the flight_log row so you would see that it could not be the answer to one of the other questions. Nice of them! Average mark: 2.3/3 (76%) The majority of students were able to interpret the elements of the context diagram; however, students should ensure that they use the examples in the table and text provided in the diagram to assist in formulating accurate responses; for example, image_data is a more accurate response than image or picture data, etc. b. To state the position of any animal found, longitudes will be entered as numbers, for example, 97.73858. When creating the data dictionary for individual data items, Melanie has a choice of setting longitude to 'integer' or 'floating point'. choice [1 line] Floating point. justification [4 lines] The numbers contain a fractional part, and integers cannot hold these. A pretty easy way to earn 2 marks. If you needed 4 lines to justify your choice, something is going wrong! Average mark: 1.6/2 (80%) Most students were able to identify ‘floating point’ as the most appropriate data type for storing longitudinal values, as they required the use of decimal values. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(3 marks) |
Question 3 (3 marks) Software will have to be written for the PNPW computer, the drone and the tablet computers to be used by park rangers. Melanie has worked out the main processes for the AADS. These are shown and numbered in the incomplete data flow diagram (DFD; Diagram 5). Which process will run on each of the computer systems below? (You may write just the process number.) the PNPW computer - (1) plan flight the drone - (3) control flight and detect hotspots the tablet computers - (2) visualise telemetry data Note - it's pretty easy to find the named external entities in the DFD and trace the outgoing arrows back to the circles of their related processes. Average mark: 2.5/3 (83%) the PNPW computer: 1 – plan flight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(3 marks)
|
Question 4 (3 marks) Melanie has not yet labelled the data flows in her DFD (Diagram 5). A - Visualised telemetry data B - Flight Command C - Patrol Path Note: This question may look like a scary DFD question, but it's really quite straightforward. It's much easier if you remember that the DFD is actually just details of processes within the Context diagram's circle. Notice that both the DFD and CD show the same external entities (park ranger, HQ, drone), so their data flows can be read together to get information about flows within the system and between the system and its partners. It's a good question to test students' understanding of the relationship between a CD and a DFD. Average mark: 0.9/3 (30%) The data flows should have been labelled
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(4 marks) |
Question 5 (4 marks) The data store in Melanie's DFD will contain a sequential list of global positioning system (GPS) coordinates. The coordinates will be entered in flight order, with the first coordinate entered being the first point the drone flies to. Before take-off, more points could be added to the end of the list if required. In her design notes, Melanie has indicated that this data store should have a stack structure. A colleague suggests that it should be a queue data structure. choice [1 line] Queue. justification [6 lines] You want the entries to come in the order in which they were entered - the first datum out of the structure should be the first point to fly to. A queue, being First In First Out (FIFO) behaves like this. A stack, however, would return the last-entered coordinates first, and end with the starting coordinates, because it is a First In Last Out (FILO, or LIFO) structure. Note - It's easy to remember...
Average mark: 2.6/4 (65%) Queue data structure
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(5 marks)
|
Question 6 (5 marks) George, one of the programmers for Drone Solutions, has been doing some research on the internet and has found some software, written for a drone, that was developed overseas. He downloads the software and begins altering it. Melanie sees what he is doing and orders him to look up the code of ethics for Drone Solutions. a. Explain the purpose of a code of ethics. 3 marks. [7 lines] It lays down the rules for acceptable behaviour for members of a group so they are all aware of what is appropriate and what is not. This can prevent breaches of the rules due to honest ignorance of them, e.g. by newcomers. It also lets the group leaders sanction rule breakers since they had no excuse for misbehaving. A code of ethics also serves to uphold the public reputation of a group. It also bonds its members in a comraderie born of shared ideals. Average mark: 1.3/3 (43%) In general, students were able to give some information about the purpose of a code of ethics; however, many found it difficult to expand their response to provide adequate detail and depth for full marks.
b. What should George do to resolve this ethical dilemma? 2 marks [7 lines]
Once again (they did it in the 2013 ITA paper, B8c) the examiners have just assumed there is an ethical dilemma with no due explanation. The case study did not say whether the software was commercial, freeware, Open Source, GNU licensed or whatever. Did Melanie even ask the status of the software? Not a good question. Average mark: 0.5/2 (25%) Students needed to discuss using the code of ethics and/or decision support frameworks to help resolve the ethical dilemma.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(5 marks) |
Question 7 (5 marks) When a drone detects a hotspot (a temperature above 20°C), it immediately interrupts its preset patrol path and begins monitoring the hotspot. This new path will allow the drone to continuously view the hotspot. This is done in a function called StartMonitoring. It will continue to monitor for five minutes before returning to its patrol path unless told to continue monitoring or to resume its patrol path immediately. This message is received in a variable AlertReply. If told to continue monitoring, it will do so for five minutes or until another AlertReply is sent. When it has finished monitoring, it automatically resumes its patrol path using a function ResumePatrol. The following is a section of the algorithm. Get DetectedTemp a. George decides to desk check the loop in this algorithm by using various values of CurrentTime and AlertReply to see if the loop behaves as required. Complete the following table if the value for FinalTime on entering the loop is 11:00 am. 3 marks
Working space [ about 6 empty lines of space]
Note - This is how I do deskchecks - beside each line of code I put down the state of variables and logical tests after that line is executed. Average mark: 1.6/3 (53%) Similar types of questions have appeared in past examinations. In this question, students were required to provide the action observed in each test; many missed this and wrote about the change to variables or that the drone continues on its path. b. Identify the major logic error in this algorithm. 1 mark [4 lines] The ending condition of the loop is incorrect. The drone should should continue monitoring until the final time is reached or the AlertReply tells it to resume its patrol. Average mark: 0.5/1 (50%) Many students identified that the algorithm required both conditions (time expired and resume patrol) to be true, but only one needed to be true to resume the patrol. c. Rewrite one line of the algorithm to correct the major logic error. 1 mark [2 lines] Until (CurrentTime > FinalTime) Or (AlertReply = Patrol) There's quite a lot of work involved in answering his question. I thought it was worth more than 5 marks! Average mark: 0.5/1 (50%) Many students were able to identify that the AND needed to change to an OR in the UNTIL statement.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(3 marks)
|
Question 8 (3 marks) George says it will not take him long to create the screen design for the software on the tablet that will be used by the park rangers, as the screen design will be easy and everyone uses tablets these days. Outline one concern with George's approach to the screen design and suggest what George could do to ensure that his screen design is effective. [7 lines] His assumption that "everyone uses tablets" is incorrect, so he may design the software carelessly, making it hard to use by those who don't know how to use tablets. He should consider the needs of all types of users - especially those unfamiliar with using tablets - to make the software as easy to use as possible, while not inconveniencing skilled 'power' users. During the design process, he should get the input from skilled and unskilled tablet users to reveal potential problems with his design ideas. Average mark: 0.6/3 (20%) The majority of students were not able to outline a concern such as ‘George is not taking the skills or knowledge of the animal spotters into consideration’ and instead wrote lengthy responses about elements of the user interface. Ideally, responses should have identified a concern (not seeking input from spotters), and discussed two methods for gaining input (before design) or feedback about the design from the spotters.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(5 marks) |
Question 9 (5 marks) Before a park ranger can give directions to a drone via the software on a tablet computer, they must enter a username and password. DISPLAY "Username?" IF (Username = CorrectUserName) AND (Password = CorrectPassword) THEN Hmmm. Rather basic and repetitive: the previous question has already exercised students' knowledge of AND and IF. Average mark: 2.9/5 (58%) A complete algorithm is shown below. Other answers were also possible. Get (or Read) UserName and Password Students were expected to use the information provided in the text of the question to develop an algorithm. Key elements of the algorithm included getting the inputs, correct logic within a selection control structure, control structure options (load and display) and appropriate indentation.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(3 marks) |
Question 10 (3 marks) Each park ranger will be asked to provide a password for the monitoring program. Begin Complete the table below with three passwords that will test each of the different circumstances listed.
I mean - the code is completely useless! Why is it there? Students only had to create three passwords that followed the rules given at the start of the question. They needn't have read the code at all. Or they could have wasted their time as I did trying to work out what the "gotcha" was, because - hey! - that code had to be there for a reason, right? Apparently not. And to think of the time I wasted neatly formatting that pointless lump of code with all of those nice and bolded operators and graphic assignment operators! Grrr. This was far, far too simple, even it's only worth 3 marks! Average mark: 2.6/3 (87%) A number of students missed the requirement for >4 (greater than four characters) and only provided four, while others missed the requirement that to test the last condition the test data had to be greater than four plus an invalid character.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(6 marks)
|
Question 11 (6 marks) George talks to Melanie, who points out a major flaw in his password system. The aim is to have one tablet per monitoring station, not one per user, to reduce costs. A file of all usernames and passwords (expected to exceed 1000 over time as staff move between parks) will be on this tablet. Maximum memory will be needed on the tablet to display the high-resolution video, so Melanie suggests that the file is searched each time a user logs in instead of reading the whole file into memory. She suggests that the file be a random access file, and that the username and password are located using a binary search. a. To allow a successful binary search on username to occur, describe what must be done with the records in the file before the search begins. 1 mark [3 lines] They must be sorted by username. Average mark: 0.2/1 (20%) The data in an array needs to be sorted on the username field. b. Describe the process that the binary search will use to locate the given username. 2 marks [8 lines] It will divide the list in half and determine which half the username should be in. Average mark: 0.7/2 (35%) The starting point of the search is the midpoint of the file. Half will be disregarded based on the midpoint being higher or lower than the search value. This is then repeated until the value was located.
c. Explain the difference in the way records are accessed when using a random access file compared to a serial access file and why Melanie has suggested using a random access file. 3 marks [7 lines] Since all records in a random file are the same length, the starting byte of any record can be calculated mathematically with (recordnum - 1) * recordlen + 1. Thus, any record can be accessed immediately, skipping any records between the search start point and the record's location. Serial files, however, contain records of variable length so any record's starting point cannot be calculated. A search for a record must begin at the start of the file and step sequentially through every record until the desired one is found. Thus, random file access can be far faster than serial file access, particularly as file sizes increase, which is what Melanie is anticipating. There must be some other questions that VCAA can ask about binary searches and random files... These old chestnuts appear on every exam.... Average mark: 1.4/3 (47%) To gain full marks students were required to describe how records are accessed when using a random access and a serial access file, and why random access files are more appropriate when doing a binary search.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(2 marks) |
Question 12 (2 marks) Brenda suggests to George that instead of using tablets to display the data coming from the drone, they should use mobile phones as these are cheaper and everyone has one, so tablets would not have to be purchased.
Average mark: 1.3/2 (65%) The use of a tablet was a better choice as the data being displayed was images with small detail; this was not appropriate on the small screen of a mobile phone.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(4 marks) |
Question 13 (4 marks) When the drone lands, the data files, including video and GPS coordinates, will be downloaded onto a notebook computer. The files will then be deleted from the drone so that there is space for data files from the next flight. a. Is this an example of backup or archiving? Give a reason for your answer. 2 marks [5 lines] It's archiving. A backup leaves the copied data in place. Archiving moves the data, then deletes the original. Average mark: 1.7/2 (85%) This is an example of archiving, and many students were able to identify that this was characterised by removing the file from the original device. b. Describe another procedure that would reduce the chance of these files being lost. 2 marks [7 lines] "Another" procedure? The first procedure was not aimed at reducing the chance of files being lost - it was just moving them! The question should have been "Describe a procedure..." So - what is the question expecting - backup suggestions, perhaps? Copy the files to another device (e.g. USB drive, portable HDD, cloud storage) and store the files in a different location. Note - Encryption would not stop the files getting lost. It would just stop them being read if they got stolen. Average mark: 1.3/2 (65%) Students were able to describe a backup method that used an additional storage medium, with many suggesting ‘cloud’ options.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(6 marks)
|
Question 14 (6 marks) A major security concern for the software being designed to run on the drone is that hackers (unauthorised users) could take over control of the drone. The exam should have bolded the word "two".
Average mark: 1.8/6 (30%) This question was poorly answered by most students. Many gave generic security measures, and/or failed to explain the measure or provide details as to how the measure would prevent unauthorised access. Students needed to ensure that the measures they were explaining were appropriate to the device identified in the question (the drone).
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(3 marks) |
Question 15 (3 marks) Once the software has been accepted by PNPW, all park rangers will be required to use it. The park rangers are very unhappy about this as they have no idea how the new software will work and so they complain to the PNPW management.
Average mark: 1.7/3 (57%) As this question asked students to ‘resolve this conflict’ it was expected that they would write about decision support frameworks; however, most responses included details of training and/or documentation and were awarded some marks. As some resolution was required, it was important to include some evaluation/feedback mechanism from the park rangers, before, during and/or after training. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
END OF QUESTION AND ANSWER BOOK |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
On the whole - good, with a glitch or two. Certainly better than the ITA paper - as usual.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
STUDENT FEEDBACK |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Matt | Mr Kelly (or Mark or whatever) Friday's software development exam was my last year 12 exam, and I felt awesome going into it because I feel like I really know the software course, and THAT was almost ALL because of your awesome website. VCEIT was my true companion in sofdev this year, taking on the role of textbook and teacher, as neither my actual textbook nor my actual teacher seemed like they wanted to teach me the course (clsss was mainly devoted to SAC practice, which I didn't get a lot out of having already learned how to program beyond a VCE sofdev level before year twelve). So I want to thank your website for being there for me and actually allowing me to self-study the course while it wasnt being taught in class. I was only able to move through the course due to the comprehensive notes you had on offer, filling in anything I was missing with a quick google search. If you're at all interested, I feel like I nailed the exam (~90% but well see) and it was a great way to finish the year off, because of the confidence I built from your website up. I'm hoping for a study score in the 40's and I would have been clueless if it weren't for VCEIT. Once more, thanks for existing and stuff, I look forward to reading the post mortem. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Jesse | Hey I got all of the answers that you got for section A except for Q2. I chose design, but you selected B (analysis). Could you tell me why the answer is not design, as I feel something as specific as occupying <10MB would show up in evaluation criteria. Thanks :) PS: Everybody down at atarnotes is eagerly awaiting sections B and C :) and we're very appreciative of your solutions :) |
Back to the IT Lecture Notes index
Back to the last page you visited
Created 17 November 2013
Last changed: March 9, 2022 11:34 AM
Original Content © Mark Kelly 2013
Images and questions are © Victorian Curriculum
and Assessment Authority 2013.
Reproduced here with permission for educational purposes.
VCE Applied Computing Notes © Mark Kelly