VCE IT Lecture Notes by Mark Kelly

IT Applications

VCAA Exam Post Mortem

2007

VCE IT Exam Post Mortem

Post Mortem Notes

This is not a VCAA publication!
I do not speak for the VCAA, the IT examiners, or exam markers.
I was not involved in the setting or marking of this examination.
Extracts from exams are all Copyright © VCAA, and are used with permission. Thanks, VCAA!
Use these post mortems at your own risk.
I reserve the right to change my mind completely, at short notice, about anything I've said here.
Suggestions, discussions and corrections are welcome.
If any third-party copyrighted material has inadvertently been used, please let me know

Questions are in black.
My suggested answers are in blue.
My editorial ramblings about the exam are in blue italics.
Examiners' report comments are in red italics.
Purple shows the explanation of an answer.

Full ITA examiner's report on the VCAA site

State percentages added 26 Feb 08

Other VCE IT Post Mortems to enjoy

ITA/Informatics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017


SD - 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017

 

SECTION A - Multiple-choice questions

Go to section B

* in multiple choice marks my answers

Across the state: average multiple choice question accuracy =
Lowest question success was (Q)
Highest question success was (Q)

Instructions for Section A

Answer all questions in pencil on the answer sheet provided for multiple-choice questions. Choose the response that is correct or that best answers the question.
A correct answer scores 1, an incorrect answer scores 0.
Marks will not be deducted for incorrect answers.
No marks will be given if more than one answer is completed for any question.

 

 

Question 1

A sudden loss of power caused by a falling tree destroyed some data on a hard drive. This data loss is classified as

A. accidental.*
B. deliberate.
C. technical failure of the hard disk casing.
D. procedural failure of login software.

My cat could have worked this out without 12 months of ITA training! What on earth were options C and D about?

93% of the state got this right.

Question 2

A bank teller uses a swipe card and a login with password to access clients' bank accounts. This security is an example of

A. physical and biometric.
B. electronic and physical. *
C. biometric and biometric.
D. electronic and electronic. <= officially right answer - I'm dubious

It's certainly not biometric, so rule out A and C. One would have to classify the swipe card as a physical component even though it only contributes security via electronic processing. Unlike a barred window, a card will not physically stop an evildoer (unless the card was the size and thickness of a door, with a lock fitted...)

43% of the state got this right. 48% said B like I did.

Many students were distracted by electronic and physical (option B) and did not correctly identify the security measures used to prevent unauthorised access to data and information as electronic and electronic.

 

 

Question 3

To protect emails sent via the Internet, users should

A. backup the emails.
B. encrypt the emails. *
C. carbon copy the emails.
D. blind carbon copy the emails.

I mean to say. My cat could have got this right in his sleep.

90 % of the state got this right.

 

Question 4

The primary key field of a database must always

A. be sorted.
B. use an autonumber data type.
C. have an entry for each record.
D. contain entries that are a combination of text and numbers.

Another fairly dumb question. C is right, but it should really have been "a unique entry". Too easy.

58% of the state got this right.

 

 

Question 5

Separate campuses of a secondary school are two kilometres apart. The best transmission media to securely connect all campuses to the school intranet is

A. wireless.
B. fibre optic.*
C. USB (Universal Serial Bus).
D. UTP (Un shielded Twisted Pair).

Aha... one could argue that microwave would be "wireless" and therefore acceptable, but microwave is, AFAIK, rather expensive compared to FOC. If you're thinking of wireless as 801.11 ("local" wireless), it's not an option because 2km is far too distant for it to work.

51% of the state got this right.

 

 

Question 6


What is the most efficient formula the owner can enter to calculate the correct Total in cell B12?

A. =(B4:B10)
B. =SUM(B4:Bl0)*
C. =SUM(B4+B10)
D. =(B4+B5+B6+B7+B8+B9+B10)

Oh, really. This is a year 7 IT question.

83% of the state got this right.

 

 

Question 7

The formula =COUNT(B4:Bll) in cell B13 will return

A. 7*
B. 8
C. #######
D. an error message

The COUNT( ) function does not count empty cells like B11.

45% of the state got this right.

 

Question 8

A new layout for a timetable must be produced from an existing spreadsheet and multiple copies printed on a company's black and white laser printer, rather than the new colour printer. The constraints on this solution are best described as

A. economic and operational.
B. operational and social.
C. social and technical.
D. technical and economic.*

Hmmm. The IT glossary does define constraints as including economic, social and technical, so that rules out options A and B. The use of that specific printer is a technical constraint, but that does not help further limit the possibilities. So we need to decide between social and economic. There's no hint of a "people" issue so it must be economic. One supposes that the company insisted on using the B&W printer because it was cheaper, but it's a bit of a stretch for students to have to assume that - some colour printers cost the same amount as B&W lasers if the page is monochrome, so the colour laser might not be cheaper.

47% of the state got this right.

 

Question 9

Validation is used to
A. check the accuracy of calculations.
B. detect software errors and alert the manager.
C. test functions and alert programmers to errors.
D. prevent inaccurate data from entering the system. <== official 'right' answer. Absolute rubbish!

X. None of the above.*

This is a big worry.  It cannot be D because validation does NOT check the ACCURACY of data, only its reasonableness. Even the sacred IT glossary says validation checks data input to a system is of an "appropriate type for processing, and within acceptable boundaries")

B and C are silly.

So are we to accept that validation is used to check the accuracy of calculations?  Not really - that's called testing.

I think the question is just plain wrong, and I'm tempted to appeal against it on the grounds of factual inaccuracy.

Any other opinions?

63% of the state got this right - or thought they did!

 

 

Question 10


A virtual team of medical specialists located all over the world uses a virtual private network (VPN) to discuss their research in real-time. This is an example of

A. email using a LAN.
B. email using a WAN.
e. web conferencing using a LAN.
D. web conferencing using a WAN.*

The key words in the question are "all over the world" (meaning it's a WAN), and "in real-time" which includes web conferencing, not email.

86% of the state got this right.

 

 

Question 11


The main purpose of the Copyright Act 1968 for web designers collecting images for a website is to ensure

A. confidential records are secure.
B. encrypted files are not hacked into.
C. all artists receive payment for their work.
D. intellectual property is not used without permission.*

Many of these questions are far too easy, I reckon.

81% of the state got this right.

 

Question 12

A database is used by a virtual team of scientists to record and process temperature readings taken around volcanoes.
The IPO (Input-Process-Output) chart best representing the design of the database is

The answer is C. Temperature is the input data. The processing involves calculations. The output is the report. Not too hard.

90% of the state got this right.

 

 

Question 13

The most appropriate way to evaluate the effectiveness of a website offering online football ticket sales is to

A. interview all customers about the clarity of instructions.
B. survey customers online about the clarity of instructions.*
C. interview all customers about the speed of response to mouse clicks.
D. survey customers online about the speed of response to mouse clicks.

Key word is "effectiveness" which rules out C and D which refer to efficiency. Personally interviewing all customers would be next to impossible. The only option left is to survey a sample of customers.

86% of the state got this right.

 

 

Question 14

A Network Operating System (NOS) is

A. software that controls the operations of a network.*
B. hardware that controls the operations of a network.
C. hardware that provides secure connections between components in a network.
D. software that enables users to create multimedia network information products.

Again, too easy.

71% of the state got this right.

 

 

Question 15

The most appropriate data type for the field in a database storing Phone Numbers such as (03) 8999 7777 is

A. text.*
B. integer.
C. number.
D. autonumber.

Yep. Unless you need to do arithmetic on a 'number', you can store it as text. If you try to store it as a number, you cannot use spaces, parentheses or leading zeroes. Phone numbers must be stored as text. Postcodes can be stored numerically if you like - in Australia, but not in the UK where they contain letters.

30% of the state got this right.

Many students chose number as the data type (option C); however, the phone number shown contained ‘spaces’ and ‘brackets’ which are text data types (option A).

 

 

Question 16

The database table below is used to record a personal movie collection.

Which movie ID would be returned if the query below was entered?

Category <> Thriller and Time < 90

A. 3*
B. 4
C. 2,3
D. 3,4

I was worried how the examiners would phrase the database question. This has a whiff of 'Access' but nothing that a sensible Filemaker user couldn't approach... or any Excel user, come to think of it. Such formulas are not solely a database issue.

Only 15% of the state got this right. Yikes! My class got 0% - possibly a 'Filemaker effect'.

The majority of students chose option B. The query contains the comparison operators ‘< >’ (not equal to) and ‘<’ (less than). Both conditions must apply under the logical operator ‘and’. This query will return the Movie_Title ‘Fun and Games’ which has the ID 3 (option A).

 

 

Question 17

The fruit and vegetable manager of a supermarket wants to increase sales by 2% over the next six months. This is an example of

A. an organisational goal at the tactical level of decision making.
B. an organisational goal at the strategic level of decision making.
C. an organisational objective at the tactical level of decision making.*
D. an organisational objective at the strategic level of decision making.

The specific target of 2% tells you it's an objective rather than a goal. The next bit is not as easy to decide. Tactical vs strategic questions tend to be murky.

For a start, is this manager of a specific branch of a supermarket (e.g. Safeway in Bentleigh), or is it referring to the national chain? Makes a difference! I read it as a branch manager.

Strategic concerns tend to long term - whether 6 months could be called long term is a matter of debate. I'd tend to read it as medium term.

Smells like tactical to me - aiming to implement a larger strategic goal of overall profitability for the entire organisation.

28% of the state got this right.

Many students were distracted by an organisational goal (options A and B). The scenario described an organisational objective at the tactical level of decision making (option C). An organisational objective is a small, achievable and measurable task undertaken to achieve a goal.


 

Question 18

Vera starts entering data for the electronic school bulletin at 3.00 pm. All notices must be sent to Vera by
3.00 pm. She uses a template and uploads the bulletin to the school's intranet. Vera is changing jobs and has to provide a flow chart of the process for the new person who will complete the bulletins. Which chart best represents the process described?

Answer is B.

Can't be A or C because they allow her to enter notices before 3pm. The labelling of the decision arrows is wrong on D. That leaves B.

73% of the state got this right.

 

 

Question 19

Criteria to evaluate the effectiveness of an organisation's data management strategy would measure

A. cost and reliability.
B. cost and recovery time.
C. integrity of data and currency of files.*
D. currency of files and speed of retrieval.

Again the key word is effectiveness, ruling out issues of cost and speed. The only option left standing is C.

54% of the state got this right.


 

Question 20

A school library keeps track of book loans using a relational database which has tables called Books, Borrowers, and Loans. Parts of these tables are shown below.

Which diagram best represents the relationship between these tables?

Answer (I hope!) is B.*

Firstly, fortunately, Filemaker and Access show relationships in similar charts, so this was not a problem for either of them. Such representations are also pretty standard in the database world, so most DBMS users could make sense of it.

This was quite a challenging question: certainly a discriminator to find the A+ students in the audience. The 4 options are identical except for the "1 to many" or "many to 1" relationship indicators. It took me quite a few minutes to get my head around it.

This is how I read it...

  • A book can be lent out to many people over time, so the Loans table could refer to the same book many times.
  • A borrower can borrow many books over time, so again the Loans table would refer to the same borrower many times.
  • Therefore the Loans table has many references to individual books and borrowers - each of the many loans is strictly tied to a single book and a single borrower.
  • So one book can be linked to many Loans.
  • One borrower can be linked to many Loans.

34% of the state got this right.

The fairly even distribution across the incorrect options suggested that many students did not understand either the one-to-many relationship or its representation in the diagram. The correct response was option B, as it was the only diagram where the Book_ID was shown as one (unique) in the Book table and the Borrower_ID was shown as one (unique) in the Borrower table.


End of Section A

 

SECTION B - Short answer questions

Go up to section A
Instructions for Section B

Answer all questions in the spaces provided.

The examiners said: The short answer section was answered well. Students provided a wide variety of examples to support their descriptions of procedures, people, software and equipment in organisational settings.

 

Question 1

The site map of the Gum Leaf State Primary School's website is shown below. There are eight blank positions (A, B, C, D, E, F, G, H) for new links to be added.


There are complaints that the Weekly Newsletter for parents is not easy to find.

a. Indicate in which position (A-H) you would place the Weekly Newsletter link. Justify your choice (1+2 lines, 2 marks). State average=1.7

You'd have to go for D. It's logical to look for a newsletter immediately under a "News" heading. C is bad because it's nested in an illogical subpage. E to G make no sense. H is a reasonably logical place for parents to look too. A - a link on the home page - is a possibility if they consider their newsletter really important. Anyway, I think the the justification is what will interest the marker more than the choice of position.

Full marks were awarded to responses which selected positions A, D or H and provided an explanation of how placing the Newsletter link in the chosen position enabled users to intuitively and confidently locate the information they required. It was very pleasing to see that most students gained the marks allocated.

The principal has decided to make student reports available online.

b. Discuss this decision and describe one security feature the principal should add to the parents' page. (2 marks) State average=1.7

Discussion (3 lines)

It's a decision fraught with peril if not handled carefully. The risk of sensitive information being accessed by unauthorised people is high.

Security feature (1 line)

Logins and passwords would be necessary to ensure report information is only sent to authorised people.

Answers needed to discuss the legal obligations that principals and schools have with respect to the ownership and privacy of information, such as the use and disclosure of information, and provide examples of appropriate procedures and equipment for preventing unauthorised access to school reports placed online, such as password protection.


 

Question 2


The local council has a large library of movies, video clips and articles. Library members access video clips and articles via the council website. New articles and video clips are added to the library every day. The technician has chosen a portable (external) hard disk as a backup media.

Arghh! "a backup medium". Singular! Not plural!

a. Identify two features of the portable hard disk and explain how each is an advantage as a backup media. (1 line for each feature, 2 lines for each advantage - 2 marks) State average=1.3

Feature 1 - high speed storage and retrieval

Advantage - backups and restores could be done very quickly. Recovering from data loss would be fast.

Feature 2 - large capacity

Advantage - many full backups could be done on a single medium, saving on the handling of media.

Other advantages could be:

  • low cost per megabyte stored
  • reliability because hard disks can be worked a lot harder and longer than DAT tape before the media starts to become unreliable.
  • easily removed from the system and taken to an offsite location.

‘Portability’ and ‘capacity’ were appropriate features. Students also needed to provide explanations relevant to the needs of the library, the technician, or the types of files stored.

The technician must recommend and justify a backup strategy.
b. Recommend a storage location and a backup schedule for the backup media.4 marks State average=2.5

  Recommendation Justification
storage location

Offsite, such as the technician's home

• onsite in a fireproof secure cabinet
• offsite in a secure location

 

If the original data are stolen or destroyed by fire, for example, the backup media will not also be stolen or destroyed and a data restoration can be done.

• so that it can be re-instated quickly
• so that it is not damaged in a disaster

backup schedule

Incremental backups daily, full backups weekly, monthly and annually.

• daily or incremental backup after hours

 

Incremental backups are faster and consume less media space than full backups. However, they rely on regular full backups as their starting point. The last full backup is restored first, and the incremental backups since that full backup are added to it.

• because new video clips are added every day

Students were asked to recommend and justify the procedures associated with the equipment chosen as backup media for the library’s movies, video clips and articles. Most students were able to recommend and justify a storage location but fewer could also recommend and justify a schedule in order to obtain full marks for this question.


 

Question 3


Employees have received the following email and the network manager has been asked to send out a warning to all staff.

a. List two features of this email that the network manager would identify as suspicious and likely to give illegal access to confidential data. Explain why each is suspicious. 4 marks State average=3.4

Email feature 1 - (1 line) The recipient is not individually named, only "The Lucky Winner"

Explanation (2 lines) Spam or phishing attempts are sent en masse to anonymous email addresses, and the sender does not usually know the real name of the mailbox owner. Some sites such as Paypal and Ebay now address their customers by name in their emails to reassure them that they are legitimate senders because they do possess that personal information.

Email feature 2 - it's asking for sensitive information (account number and password)

Explanation - phishing attempts rely on misleading people into disclosing sensitive information. Even if it was a legitimate request, sending that information back to them via email would be remarkably dangerous.

Correct answers included:
• it is not addressed to an individual, so it is probably a bulk mail out and a scam
• banking details are not entered on an insecure site, so it is not a genuine email.
Most students described threats to the integrity of data and the security of information presented in this email.

b. What advice should the network manager give to staff to deal with this email? (2 lines) 1 mark State average=0.8

Delete it. Do not reply to it. Never give out any account names or passwords via email even if you think you know the person asking for it. Do not believe offers that are too good to be true.

Accepted responses included:
• delete
• move the email to trash.

c. Describe how this advice should be communicated to staff. (2 lines, 1 mark) State average=0.35

If it's a small organisation, a staff briefing or public address announcement could avert immediate danger. Since potential victims must use email, a warning could be emailed to everyone. A warning message could automatically be displayed when users logged into the network.

Any of:
• immediately
• face to face warning
• at a staff meeting
• via a public address announcement.
Full marks were awarded where the answer indicated that the network manager could be certain the message was received quickly and by as many users as possible.

 

 

Question 4


The on screen user documentation for a spreadsheet program is shown below.

a. Identify two navigation features of this onscreen user documentation. (2 x 1 line, 2 marks) State average=1.45

1. Back, forward and home buttons
2. Links to table of contents, assistance, training, downloads etc
3. Search box

Any two of:
• search box
• link to ‘Training’
• the table of contents.
Other explicit examples of navigation features visible on the screenshot were also accepted.

b. i. Identify what you could measure to evaluate the efficiency of the onscreen user documentation.(1 mark) State average=0.85

The time taken to locate the particular help you needed.

Accepted efficiency measures included the time taken or effort required to display the required information.

ii. Describe how you would measure it. (1 mark) State average=0.85

Give typical end-users a topic to ask for help on (e.g. how COUNT differs to COUNTA) and time them to see how long they take, compared to other means of finding the same information (e.g. a printed user manual).

Appropriate measures included:
• count the mouse clicks
• record the time for information to appear.
Answers which correctly described surveying users about the time or effort associated with the help screens were also awarded full marks.


 

Question 5


The tasks below are part of a Gantt chart used to monitor the creation of a new database to sell sports equipment online.

a. Identify a task in the list above which is a milestone. 1 mark

Task 25 (has zero duration)

Task 25 is a milestone, as it has zero duration.

b. i. Define predecessor. (1 mark)

It's a task that must be completed before a following task can begin.

A predecessor is a task which must occur before another task can start.

ii. Task 24 does not have a predecessor listed. Explain what this means for the person coordinating these tasks. (1 mark)

It means that task 24 can begin as early as the person likes.

With no predecessor, Task 24 can start at any time.

State average=1.95 / 3


 

Question 6


The Clean Water Research Group has a virtual private network (VPN) for a group of scientists to share their research findings.

a. Identify one reason the scientists need a virtual private network. (1 mark) State average=0.4

So they can communicate in a secure environment using the existing infrastructure of the internet so they don't need private cables between them (e.g. ISDN).

Acceptable answers included either of:
• to provide closed or limited access to research data
• so that the media or rival scientists cannot use the research findings without permission from the research group.

b. Describe one design element used to present the scientists' information and explain how this design element helps to achieve the purpose of the website. 2 marks State average=0.7

The glossary defines Design Elements as "Factors that contribute to the appearance and functionality of an information product. In this study these elements are proportion (visual hierarchy), orientation (direction/aspect), clarity and consistency, colour and contrast, usability and accessibility, appropriateness, relevance." but for the life of me I can't see any of those being used to "present the scientists' information."

Answers which described the graph, headings or icons in terms of proportion, orientation, clarity and consistency, colour or contrast, usability or accessibility, appropriateness or relevance were awarded full marks. For example, ‘contrast is achieved in the heading where a dark relief is used with a light coloured font’ and ‘consistency is achieved through the use of similar shapes (squares and rectangles) and the use of a single font type’.

You have to present your plans for a colour upgrade to the website.

c. Recommend a design tool to represent the new colour choices you will make. Explain why you would use this design tool. 2 marks State average=0.6

A screen mockup or layout diagram. It represents the appearance of the interface, including colour schemes, positioning of elements, object / text sizes etc.

Acceptable design tools included:
• annotated diagrams
• screen mock-ups
• storyboards
• layout diagrams.
Students should know the design tools and design elements, which are listed in the study design on pages 28, 32 and 48.


 

Question 7

Conferences-R-Us is a small business which organises conferences for other organisations. At present, people wishing to attend a conference must select and download the application form from the Conferences-R-Us website, complete the form by hand and return it by mail with payment for the conference.

Payment can be made by sending a cheque or completing the credit card details on the application form. Susan must record the data from each form so that accurate records of all applications and payment methods are available. She can use either spreadsheet or database software.

a. Select one of these software types and describe an advantage it has over the other.1 mark State average=0.55

Spreadsheet - allows easy automated calculations by using formulas. Electronic validation can highlight data input inconsistencies (e.g. credit card number that is missing its expiry month value). Easier to set up than a database is.

or

Database - better for data storage and retrieval. Can also do calculations and data validation. Better for producing nicely formatted reports, receipts etc.

A spreadsheet is easier to set up than a database, and requires less training to use.
A database, once it is set up, has better input and reporting features than a spreadsheet.

b. Explain how this software will help Susan organise this data. 2 marks State average=0.85

A spreadsheet could easily generate totals and charts, but would be less useful for reporting purposes. She would use a different column for each data field.

or

A database can store in fields the names and payments that are received, and it can sort, add up, group, search and filter the data easily.

Susan can use the spreadsheet to set out columns for all conference and customer details. She can set formulas to calculate totals and use a sort function to arrange the data into whatever groups she needs.

Susan can use the database to set up forms to input online data directly into the right table. She can use a report wizard to print or display the timetables she needs.

A variety of other answers were also accepted, provided the student showed that they could analyse current information processing practices and identify appropriate database management or spreadsheet features, functions, formats or validation techniques to produce the required information.

When Conferences-R-Us have received payment, information about the conference and a receipt are emailed out 10 days before the conference.

c. List four data items that would be included on the receipt to be emailed. 2 marks State average=1.5

  • 1. Description of the services that were paid for.
  • 2. The total amount paid.
  • 3. The date.
  • 4. Who paid the money.

There are probably others.

Any four of the following data items to be included on a receipt were accepted.
• Conference items, such as: conference name, time, location.
• Payment items, such as: credit card details, amount received, cost of conference.
• Client items, such as: client name, client email address.

The Conferences-R-Us website collects personal information and must comply with the Privacy Act 1988.

Hmmm. I'd like to know why they must comply. Do they trade information, turn over more than $3m per annum or are a federal government agency?

d. Name one principle of this legislation. 1 mark State average=0.75

Any of the National Privacy Principles would do

The manner and purpose of collection of personal information. Any one of the privacy principles listed in the Privacy Act 1988 was accepted. It was very pleasing to see that most students obtained the mark for this question

e. Explain what Conferences-R-Us must do to comply with this law. 2 marks State average=1.15

See the link above

Susan must explain the reason for collecting the data in a statement of purpose which must be clear and easily accessible on the Conferences-R-Us website. Other acceptable answers correctly named a key principle of the Privacy Act 1988 and explained what Conferences-R-Us must do to monitor or control storage, or to communicate, or to dispose of the personal information collected via their website.

 

 

Question 8

Art-Logo is a business that creates logos for customers starting a new business. Their studios in Melbourne and Sydney have networks connected via the Internet.

a. Describe one way the Art-Logo network helps the artists working in the studios. 1 mark State average=0.55

  • It lets them collaborate on jobs and share work easily.
  • They can store communal files centrally and access each others' work.
  • They can all access resources on the internet
  • They can use email to communicate with each other and their customers

The network enables the artists working in different studios to quickly or easily collaborate or share data, information, ideas and files.

Art-Logo's network is a client-server type.

b. Describe an advantage this has for the network manager. 1 mark State average=0.3

With a NOS, he/she can allocate rights and resources to staff on a needs basis, and can control what they do. The server can also run programs for the good of everyone, e.g. DHCP, virus scanning etc.

Correct responses explained that a client server network provides a network manager with a central, electronic overview, or it allows the monitoring of security or file management. Other answers were also accepted where it was clear that the advantage described derived from both central and electronic control or monitoring.

The owner of Art-Logo has a disaster recovery plan which includes Uninterruptible Power Supplies (UPS).

c. Explain one benefit of an Uninterruptible Power Supply for the artists working in the studios. 1 mark State average=0.6

A UPS keeps connected computers running for a time after the power goes off, so (if the UPS is connected to the artist's PC) artists don't lose their unsaved work. If the UPS is connected to the server (as it should be!), the network's server can continue its work.

In the event of a power surge the Uninterruptible Power Supply gives the artists time to save the file they are working on. Most students were able to explain the benefit of an Uninterruptible Power Supply within a strategy to prevent accidental equipment malfunction.

 

Question 9

Adam has designed a database of club records and used the Lastname field as the primary key.

a. Explain why this design will cause problems. Give an example to support your answer. 2 marks State average=1.0

The database would not be able to distinguish between 2 people with the same surname. E.g. if there were 2 Smiths, there would be no way of uniquely identifying one or the other.

Following are some examples of acceptable answers.
• Primary keys must be unique. Given that two people can have the same surname, surname alone cannot be used as a primary key.
• When a postcode is included in the suburb field, you cannot sort by postcode or it cannot be validated easily.
• ‘Street’ only has a number and no street name, which will make it impossible to deliver letters.

b. Adam has used a Boolean data type in the Fees-Paid field. State average=1.05 (i + ii)
i. Describe the function of a Boolean data type. 1 mark

It stores a true/false, yes/no value.

ii. Explain why Adam has used this data type for this field. 1 mark

The Boolean data type requires very little storage space so the most efficient way of storing the "Fees Paid?" data.

This is more of a Software Development question!

Adam has used it because fees paid only has two options, paid or not paid

Adam would like to use electronic validation to check that the postcodes are between 3000 and 3999.
c. List the changes Adam needs to make to the database design. 3 marks State average=1.16

He would need to add a Postcode field and make it numeric.
Then he'd need to create a validation rule that would reject values <3000 or >3999. [In reality he'd need to add 8000-8999 too].
Then he would need to either enter the postcode data or use a table containing all postcodes with a lookup or relationship to fetch the postcode belonging to the person's suburb.

Adam would need to:
• create a separate field for postcode (and delete it from the suburb description)
• make the new field a numeric or integer data type
• add a validation rule 2999<Postcode<4000.

The majority of students were able to comment on the structure of the database and the choice of a primary key. They also described and explained the use of the Boolean data type in the context of the question. However, it was clear that many students understood the concepts associated with the electronic data validation in the given context but could not correctly list all of the steps required.


 

Question 10

Karen is the manager of a Melbourne medical clinic with 500 patients. She has checked the appointments for the past
12 months and decided to archive the electronic record files of 100 patients.

a. Identify one reason why a patient's record file would be selected for archiving. 1 mark State average=0.5

  • The patient was dead.
  • The patient had not contacted the clinic for a long time and would probably not return.

The patients’ records chosen for archiving have not been accessed for 12 months.

b. Describe one benefit for the clinic of archiving records. 1 mark State average=0.5

It frees up online storage space so more useful data can be stored without increasing the total amount of storage available.

Archiving frees up space in the memory and makes searching the database faster.

Karen has been asked to send the archived patient records to a medical research project.

c. Discuss one legal obligation and one ethical conflict for Karen. 4 marks State average=1.75

Legal obligation (5 lines)

Under the National Privacy Principles, she would not be allowed to use the records for a purpose other than the one for which the information was collected, unless she had the people's permission.

Legal obligation: Karen has to work within the provisions of the Health Records Act 2001. For example, she must be sure that patients have consented to the disclosure of information given in confidence.

Ethical conflict (5 lines)

The medical research project might provide information that helps some or all of the patients. The conflict is that the many could benefit from the sacrifice of a few - but the rights of the few are strongly protected. She might be tempted to overlook the privacy of the patients for the 'greater good'.

Ethical conflict: Although the medical research may be beneficial to society and, in some circumstances, it may be legal for Karen to send the records to a research project, it may not be ethical. Karen may be worried about breaking the trust between patients and doctors if she reveals information given in confidence.

Many students described one of the other 11 principles in the Health Records Act 2001 to correctly answer the first part of this question. Although many students could identify a legal reason why the medical clinic should monitor or control the storage, communication or disposal of information, they were not able to explain an ethical dilemma. Many students seemed to have a vague understanding that Karen would be uncomfortable about sending the information given in confidence, but they could not frame an answer in terms of Karen ‘weighing up’ or choosing between two equally difficult or equally beneficial options.

 


Question 11

The spreadsheet below is used to create mobile phone accounts for a customer.


a. Provide the formula for cell B2. 1 mark State average=0.75

=SUM(D7:D18)

Dumb question, again. Too easy.

The formula =LOOKUP(A7,$F$2:$G$4,2)*C7 has been used to calculate the result in D7.
b. Explain why the $ signs are included in this formula. 1 mark State average=0.4

It was used because the person is too dim to use named ranges :-)

But seriously folks, the $ (in Excel - not sure how other spreadsheets do it) locks row and column references so they are not automatically changed when the formula is copied elsewhere. In other words, the cell reference is converted from relative to absolute.

Note: don't use horrible $ signs! Use cell and range names instead!

My kids would have had trouble with this question because I trained them from day 1 to use cell/range names. I only referred to $ codes to explain how nasty and unnecessary they were. Prevention is better than cure.

Why spend a week teaching "How to escape from a sewer" when you could do a 5 minute chat on "Don't fall into sewers in the first place" ?

And - as a noteworthy teacher has pointed out - the formula is just WRONG. It should be VLOOKUP, not LOOKUP. Arghhhh!

The $ sign indicates an absolute reference, or that the reference remains the same when D7 changes to D8, D9, … D18 as the formula is dragged or filled down.

The mobile phone company would like to add a graph (chart) to this account.

c. Recommend a graph and explain how it would improve communication of the information. 2 marks State average=0.9

Graph

A bar chart showing a total talk time and/or cost for each carrier would be handy.

Explanation

It would show the customer how much time and money was spent on each carrier. The customer could more easily choose which carrier to use for future calls.

A pie or bar chart of the ‘Duration of Call’ or ‘Cost of Call’ data would quickly show a comparison of call duration or percentage cost per carrier. A number of other chart types and appropriate explanations were also considered worthy of full marks.

You have been asked to group the calls from each carrier as shown below.

d. List the instructions used to group the calls from each carrier. 2 marks. 2 lines. State average=0.4

  • Select rows 7 to 18.
  • Use the Sort Ascending command.

Am I missing something here, or is the question just very poorly worded?

Select cells A7 to D18 and use the sort function in ascending order. It was disappointing to note that so few students were able to answer this question correctly.

Hmm - it was disappointing that the exam question was so poorly written!

Managers have suggested the formula =If(B2>(B3+ l00),"ALERT"," ") be placed in cell C5 to alert customers when their new bill is $100 or more than their previous bill.

As Matthew, a student, pointed out - the formula is wrong. It tests for values $100 over the last bill, but not $100 or more. It should have been >= and not >.

e. Recommend appropriate data to test the formula for C5 and show expected results. 4 marks State average=2.0

You could either enter data in C7 to C18 that added up to a certain value or you could temporarily overwrite the formulas in B2 & B3 for testing the new formula in C5. Take your pick, but let's assume that B2 and B3 contain the following values whichever way you do it.

Note: the data suggested below tests for the "$200 or more" condition rather than the "more than $200" the examiners mistakenly used in their suggested formula. Remember, kiddies: it's usually boundary conditions that break your logical tests!

Test Data Expected Result
1 B2=299, B3=200 Nothing appears
2 B2=300, B3=200 ALERT displayed

Only 2 data needed? 3 would have been better to make students test all conditions.

Test Data Expected Result
1

B2=170.20, B3=80.20

Or other examples of figures which tested the “ ”option

NO ALERT

“ ”

 

2

B2=190.20
B3=80.20

Or other examples of figures which tested the “ALERT” option

ALERT

A wide range of responses were accepted, so long as the data provided correctly tested for an ALERT and “no entry”.

Question 12
A map-making and surveying company wants to improve electronic communications between the crews working in the city, the country and head office. The laptops combined with smart phones will allow crews to upload maps and photographs onto the company website for staff comment.

a. Select one laptop feature and one smart phone feature and describe how each will help input or process useful data for crews working in the country. 2 marks. State average=0.9

Laptop Feature

The touchpad

Description

It is a convenient replacement for a mouse when using a mouse is awkward. (Don't refer to the modem being a data input device - it's properly classified as a communications device.)

You could also argue that the 1.7GHz CPU is reasonably powerful for processing lots of topological data.

Smart phone Feature

The full keyboard

Description

Aids data entry - no more pressing each button 3 times to enter a single letter!

You could also say the camera is good for data input of pictures, or the Windows Mobile 5.0 operating system and MS Office lets them run many standard Windows programs on the portable device.

Laptop feature: Photoshop will help crews to process (recolour, crop or resize) images of the land they are mapping.
Smart phone feature: A full keyboard or camera will help crews input data quickly while moving around the country.

Many students selected features that were not associated with the input or processing of data or they did not relate their response to crews working in the country.

b.   Identify one hardware component required for the laptops to provide communication between crews in the country and head office. Explain the function of the component. 2 marks State average=1.05

Hardware

Modem

Explanation

It converts digital data into analogue data for communication over phone lines (either dialup or ADSL - same principle, different frequencies of sound). It lets them exchange email, for example, or access web wikis or chat rooms.

Modem: A modem will allow crews to use the analogue phone network to send digital images to head office.

c. Identify two features of the smart phone that will assist video conferencing between crews and head office. 2 marks State average=1.8

Feature 1

Internet Explorer Mobile (web browser)

Feature 2

Still/Video Camera (for video of the talking heads)

Note - don't discuss 'em , just identify 'em!

Acceptable answers included:
• camera pictures and video
• Internet access
• wireless broadband
• Windows Mobile 5.0
• Internet Explorer Mobile.
Constant advances in mobile technology meant that other features on the list could be accepted as likely to assist video conferencing.

d. Recommend one security feature the smart phones need to protect map-making and survey data when being communicated to head office. Justify your choice. 2 marks. State average=1.0

Recommendation

Encryption

Justification

Even if the data were intercepted, they would be useless to the interceptors since encryption renders the data unreadable by unauthorised people.

Encryption: Encrypted data is ‘scrambled’ so that even if it is intercepted it is unreadable to hackers. Only the person at head office with the correct encryption key can ‘unscramble’ the data and read it.

It was pleasing to note that many students were able to explain how various laptop and smart phone features helped input data or process information and to describe how a modem would support communication between crews working in the country and head office. The majority of students also explained very clearly how encryption works. A smaller number also described the procedures associated with the key that needs to accompany it.

 

In summary - too easy. It seems you can also now do an ITA exam by writing a maximum of 100 words! Where are the questions that require some detailed and deep analysis? I am trying not to call it a vegie test. It would, I expect, give outsiders the impression that ITA was a sheltered workshop.

I believe there were not enough challenging material to allow good discrimination of C students from A+ students.

And I reckon Section A, Q9 is a DOG and should be stricken from the exam marking.

 

End of question and answer booklet

Original Content © Mark Kelly 2007
Images and questions are © Victorian Curriculum and Assessment Authority 2007 & 2008. Reproduced here with permission for educational purposes.