VCE IT Lecture Notes by Mark Kelly

IT Applications

VCAA Exam Post Mortem

2009

VCE IT Exam Post Mortem

Post Mortem Notes

This is not a VCAA publication!
I do not speak for the VCAA, the IT examiners, or exam markers.
I was not involved in the setting or marking of this examination.
Extracts from exams are all Copyright © VCAA, and are used with permission. Thanks, VCAA!
Use these post mortems at your own risk.
I reserve the right to change my mind completely, at short notice, about anything I've said here.
Suggestions, discussions and corrections are welcome.
If any third-party copyrighted material has inadvertently been used, please let me know

Questions are in black.
My suggested answers are in blue.
My editorial ramblings about the exam are in blue italics.
Examiners' report comments are in red italics.
Purple shows the explanation of an answer.

Other VCE IT Post Mortems to enjoy

ITA/Informatics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017


SD - 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017

 

Last changed: November 19, 2014 1:02 PM

State average results added 16 December 2009

The SMACKOS award is given to questions that are just plain WRONG: a complete dog's breakfast.

And a new coveted award:

Questions That Make You Sick As A Dog.

Awarded to questions that are not totally wrong, but are just dumb
or are wrong in a way that does not jeopardise the answer.

NEW!

I am proud to introduce an exciting new icon: the illiterate eye-chart to denote poor examination grammatical skills,

SECTION A - Multiple-choice questions

Go to section B

 

 

Instructions for Section A
Answer all questions in pencil on the answer sheet provided for multiple-choice questions. Choose the response that is correct or that best answers the question. A correct answer scores 1, an incorrect answer scores 0. Marks will not be deducted for incorrect answers.
No marks will be given if more than one answer is completed for any question.

And let's hope this year's exam won't be a dog's breakfast...

 

 

Question 1

Joe and Helen have to name the database for their queen bee breeding program. The best filename from the list below is
A. filel.
B. databasefilel.
C. joeandHelen.
D. queenbreeding.

Answer is D. It's descriptive of its contents, unlike the alternative meaningless names.

90% of the state got this right.

 

 

Question 2

The most appropriate user documentation to help students working in classrooms send their work to a networked colour printer in the school library is
A. onscreen help.
B. the colour printer manual.
C. an email to the IT technician.
D. a quick reference card on the colour printer.

Answer is A. The manual is too detailed. The email is very inefficient and annoying. The reference card would need to be visible from any computer, which would be difficult.

81% of the state got this right.

 

 

The Information Privacy Act 2000 applies to Victorian
A. advertisers using sports stars' images without permission.
B. doctors emailing patient records to a drug company without permission.
C. small businesses selling employee phone numbers to a telemarketing company.
D. local governments or councils selling employee details to a telemarketing company.

Answer is D. The Information Privacy Act 2000 only applies to public sector organisations, i.e. state government. The others are all in the private sector.
But what's the bit about the employee details? Surely details of citizens would be more important.

35% of the state got this right.

 

 

Question 4

The design for a section of a spreadsheet shown above illustrates
A. use of conventions.
B. testing techniques.
C. use of functions.
D. data validation.

Answer is A. There is no testing visible; no functions are visible; validation is not apparent. Conventions include merging and centring text across columns; bold headings; centred headings; indication of units ($) in the heading.

73% of the state got this right.

 

 

Question 5

The best design tool for representing the relationships between pages in the wiki on a website is a
A. flow chart.
B. storyboard.
C. structure chart.
D. screen mock-up.

The official answer is C, but I think there is a case for B. A storyboard shows what pages/slides are in a site/slideshow/animation and how navigation occurs between them. Flowcharts design processes.
Structure charts lay out the structure of complex (usually hierarchical) systems, such as tables and relationships in a database. They could also describe a wiki, but I think a storyboard is more useful.
Screen mockup gives an indication of what a component will look like.

43% of the state got this right.

 

 

Question 6

A milestone
A. is shown as a circle in a Gantt chart.
B. is a task that has to be completed before the next task can begin.
C. indicates completion of a task that allows evaluation of the project to date.
D. occurs when a number of tasks are done simultaneously creating spare time.

Answer is C. It is a diamond in a Gantt chart; B refers to a predecessor; D is hinting at slack. Milestones are points of progress and help project managers gauge whether they are running on time or not. Milestones have zero duration since they are not tasks that have to be carried out: they just happen.

67% of the state got this right.

 

Use the following information to answer Questions 7—10.

Sue uses the spreadsheet below to monitor her monthly income and expenses.

 

 

Question 7

The formula to calculate the SubTotal Income for January is
A. SUM(B3:B5)
B. SUM(B3:B6)
C. =SUM(B3:B5)
D. =SUM(B3:B6)

Answer is C. It won't be A or B because they lack the equals sign that denotes that the cell contents should be interpreted as a formula (see grumpy note below). It can't be D because the formula would refer to itself, causing a circular reference error.

Grumpy note: Are we now officially specifying Excel syntax as the only spreadsheet syntax in the world? Does every spreadsheet program in the world use the "=" to indicate a formula? Hmmm. Must check that out...

90% of the state got this right.

 

 

Question 8

The Total amount of cash left to spend in February is most efficiently calculated in C14 by the formula
A. C6-C12
B. =C6-C12
C. =C3:C5-C9:11
D. =C9+C10+C11-C3-C4-C5

Answer is B. Subtract total expenses (C12) from total income (C6). Not too hard... D would give the right answer but it recalculates values that have already been calculated, making it less efficient. Again, ruling out A because of the lack of an equals sign is a pedantic bit of frippery on the examiners' behalf, I believe.

I like the word "frippery"

72% of the state got this right.

 

 

Question 9

Typing the formula =IF(D12<D6,"HOORAY"," ") in D13 returns
A. HOORAY
B. NO MONEY LEFT OVER
C. ""
D. "HOORAY"

Answer is A.

Using the data provided, D12 (total March income) is 1400+150+800 = $2350. D6 is 2500+30+20 = $2550.

Plugging those figures into the formula gives =IF(2350<2550,"HOORAY"," ").
Since 2350 is less than 2550, the 'true' condition of the IF is calculated: the literal text Hooray.
There are no double quotes displayed in the cell, so it's not D.

70% of the state got this right.

 

 

Question 10

Cell protection is most appropriate for all Column A and
A. B14:E14
B. B3:E5 and B9:Ell
C. B6:E6 and B12:E12
D. B6:E6 and B12:E14

Answer is D. Cell protection is to prevent formulas being typed over.
Option A only protects the Total ($) formulae.
Option B is immediately ruled out because it protects the cells that should be typed in.
Option C protects formulae, but not as many as option D.

This question could confuse some students since in Excel you identify the cells that should be left unprotected, and then apply protection to the whole worksheet. The unprotected cells are available to be typed in, everything else is protected. This is slightly unintuitive and might cause some students to select the data cells (option B) as these are the cells they would actually nominate when applying cell protection in Excel. The students' response rate will be interesting to see when it's announced.

45% of the state got this right.

 

Use the following information to answer Questions 11-13.

Senior Secondary College uses database management software to organise the teacher and student use of printers. The relationships between the Student, Teacher and Print Job tables are represented below.

 

 

Question 11

In the one-to-many relationship between the Student table and the Print Job table
A. one record in the Student table relates to many records in the Print Job table
B. one field in the Student table relates to many records in the Print Job table.
C. one record in the Student table relates to many fields in the Print Job table.
D. one field in the Student table relates to many fields in the Print Job table.

Answer is A. Tricky one! Makes you stop and think...

It's a one-to-many relationship (indicated by the 1 and infinity sign on the relationship arrow) which means the "one" end (student) can appear many times in the "many" end (print jobs). All of the options agree about that. That's not the issue.

In the relationship, what is actually related? A record or a field within a record? A (key) field is used to identify a record, but it's the entire record that is related.
Thus, the StudentID field in the Print Job table is the field that contains the student's identifier (ID) that enables the full student record in the Student Table to be found and its fields accessed.

So, one record in the print job table such as

JobID: 12345
Teacher ID:
StudentID: S222
Date: 25Dec09
B&W or Colour: B&W

contains the field StudentID which allows the record of student ID S222 to be found in the Student Table from where his/her name, DOB fields etc can be retrieved.

38% of the state got this right.

 

Below is a view of a section of the Student table.

StudentID

FirstName

LastName

DateOfBirth

YearLevel

920034B

Julie

Barnes

12/03/92

12

920037B

Ronald

Buchi

23/11/92

12

920041C

Karen

Chan

05/06/92

12

930021C

Harry

Conrads

17/04/93

11

 

 

 

Question 12

In this view of the Student table LastName is a
A. key.
B. field.
C. table.
D. record.

Answer is B.
"Key" only makes sense if followed by "Field".
It's certainly not a table made up of many different fields.
It's not a collection of fields all describing the same entity (e.g. one person) so it's not a record.

83% of the state got this right.

 

 

Question 13

Using a value list or drop-down list for YearLevel is an effective validation technique because
A. clicking an option is faster than typing it.
B. clicking an option is easier than typing it.
C. the options can be easily modified at any time.
D. it provides a list of options reducing data entry errors.

Answer is D. Effectiveness relates to how well the job is done: the quality of the finished product, including its accuracy. Reducing data entry errors is clearly an effectiveness measure.
Option A's speed is an efficiency measure.
Being 'easier' is an effectiveness issue but it does not relate to validation.
Being able to modify options at any time also does not relate to validation.

Ah - they got the name of a drop-down list right this year. Well done!
"Drop list" - good grief!

89% of the state got this right.

 

 

Question 14

John has designed a spreadsheet to provide quotes for lawn mower repairs.
Which is the most appropriate criterion to evaluate the efficiency of the spreadsheet solution?
A. Is the information accurate?
B. Is the information up to date?
C. Does the spreadsheet provide quotes quickly?
D. Are the labels used for the headings relevant?

Answer is C. It's the only one that relates to efficiency, which is concerned with saving time, money and/or labour.
Accuracy, currency and relevance are all effectiveness criteria.

69% of the state got this right.

 

Question 15

Sam has to recommend a type of transmission media to support communication between two buildings 6 km apart.
The most suitable media from the list below is
A. microwave.
B. Bluetooth.
C. infrared.
D. Cat 5e.

Answer is A. Bluetooth and infrared are very short distance (a couple of metres at best). CAT5e has a maximum length of 100m. That leaves only microwave.

GRAMMAR ALERT: it should be 'a type of transmission medium'. Singular! Grammar takes a beating in this exam!

And referring to CAT5e is so quaint. CAT6 has been the standard UTP cable for a long time now. And now we're heading to cat7!

44% of the state got this right.

A dual prize-winning question!

 

Question 16

Workers for a telephone help line use a computer system to key in details as each caller describes their problem. The computer provides a prioritised list of suggestions the worker can use to help the caller.
This is an example of
A. an information management system.
B. a transaction-processing system.
C. an office automation system.
D. a decision-support system.

Answer is D.

GRAMMAR ALERT: Noun/pronoun agreement! It should be either "as each caller describes his or her problem" or "as callers describe their problems".

Option A does not exist, as far as I know.
A TPS records and manages transactions which is not what's happening in the case study.
An OAS electronically replaces a manual task, which does not seem to be relevant here.
That only leaves D... but I don't like it.

Firstly, DSS is usually positioned in the tactical section of the organisational decision-making hierarchy. The case study is operational management as best, and probably not even management level at all.

Secondly, if the computer is suggesting prioritised suggestions, it seems to be behaving as an expert system.

Don't like this question.

60% of the state got this right.

 

 

Question 17

A task performed by a network operating system (NOS) includes
A. saving a file to a laptop hard drive.
B. authenticating users' access to the network printer.
C. changing the mouse click speed for a new user at a workstation.
D. displaying an alert when a flash drive is first plugged into a workstation.

Answer is B. It's fairly damned obvious that a NOS is related to network matters. All the other options are purely workstation-based.

75% of the state got this right.

 

Question 18

A costume warehouse sells its 200 products on an online website and uses database management software to create tables for the stock. Two products are shown below.

Answer is B.

In order:
Can't be A because serial number data is not purely numeric. It's alphanumeric and can't be stored in a numeric field.
Could be B. Give it a tick.
Can't be C because Boolean only allows "Yes/No" type data.
Can't be D for the same reason.
So go for B.

But it's ridiculous! A category table would only contain data about categories of items, not individual baseball caps - which is what a serial number describes!
Serial numbers DO NOT apply to groups of objects, for dog's sake! Fortunately, this gaffe did not affect the correct answer.

68% of the state got this right.

 

 

Question 19

The emergency plan within a disaster recovery strategy should include
A. evacuation procedures for backup files and a schedule for reinstalling software.
B. a schedule for reinstalling software and evacuation procedures for computers.
C. hardware shutdown procedures and evacuation procedures for backup files.
D. software supplier contact details and hardware shutdown procedures.

Answer is C.

I very nearly gave this a Shmacko until I read the stem more carefully. It's referring to the emergency plan WITHIN a disaster recovery strategy. This section would describe what to do during the emergency. The rest of the document would describe what to do after the emergency when recovering from it. So we need to rule out "post emergency" actions such as reinstalling software (A, B) and supplier contact details (so you can get new copies of the software that was destroyed: option D.)

The only option that only describes a plan of what to do during the emergency is C.

But as one teacher pointed out: backups should be stored offsite. Evacuation should not be necessary!

42% of the state got this right.

 

Question 20

Task X has 20 days duration and Task Y has 15 days duration. Task X is a predecessor of Task Y. Task Y cannot start until 10 days after Task X has finished.
If Tasks X and Y are on the critical path, the 10 days of delay for Task Y is called
A. lag.
B. lead.
C. start to start time out.
D. finish to finish time out.

Answer is A.

Fascinating! This is the first time I can remember the examiners going beyond really basic project management terms. I gloss over lag and lead times in class, just to be sure, but I sure don't stress them. I'd say this is one of those "A+" discriminator questions.

Lag is the time a task must wait even though its predecessor has finished. Think of task X as "Pouring a concrete slab" and task Y as "Erecting the walls". Yes, task Y can't begin before task X ends, but it still can't start immediately: the cement must have time to cure. That is the 10 days' lag time.

Lead time is the opposite. It can happen where a task theoretically has to wait for a predecessor to finish, but in practice a start can be made before the predecessor is completely finished. e.g. if emptying a computer room before rewiring the electrics, the sparkies could start work before every desk and computer were removed.

As for options C and D, I haven't got the foggiest idea what they're about, so since I'm already happy with "lag", I'll ignore them. Since I have the luxury of Google, I looked them up and there were no hits for either term. The closest Google got was "When is the best time to start 'time out' with children?"

GRAMMAR ALERT: it should be days' duration - the duration belongs to the days.

62% of the state got this right.

Overall - few bad blunders by the examiners, but I really do not like 16.
Grammar skills: shocking!

 

 

SECTION B - Short answer questions

Go up to section A
 
Instructions for Section B

Answer all questions in the spaces provided.

 

Question 1

a. What is used to uniquely identify each record in a database?

A key field.

But it should be "table", not "database". Sloppy expression. Bad examiner. Bad!

1 mark

State average for this question was 55%

b. Backing up a database file by saving only data which has changed since the last backup is called

Incremental backup.

OR

Differential backup.

The examiners must accept either answer. The only (very pedantic and confusing) difference between incremental and differential is that a differential backup copies all changes since the last full backup, whereas an incremental backs up changes since the most recent backup of any variety. The terms are now usually used interchangeably. Anyway, since the question does not specify what sort the last backup was, I will be screaming quite loudly if 'differential' is not accepted!

( It's not a major issue anyway, though, because I doubt any students have heard of differential backups.)

1 mark

State average for this question was 60%

 

Question 2


a. Quantity*Cost = Total is used in spreadsheets.

What a strange thing to announce. Some spreadsheets, sure, but this make it sound like it's compulsory in every spreadsheet!

Complete the Input-Process-Output (IPO) chart to represent this action.

Input

Process

Output

Quantity

Cost

Quantity * Cost

(or "multiply quantity by cost")

Total

Too easy.

1 mark

State average for this question was 45%

b. Using the example: 6 items at $2.00 equals $12.00

i. what value(s) should be validated

number of items, cost per item.

ii. what value(s) should be tested?

Total.

This question is just finding out if you know that data (input) is validated for reasonableness (not accuracy) while calculations (output) are tested for accuracy.

1 + 1=2 marks

State average for this question was 35%

 

Question 3

The Year 12 students at Country Secondary College have created a virtual private network (VPN) to organise the end-of-year barbecue. A committee of five students has decided to use an online chatroom where all Year 12 students can contribute to planning the location, music and food.

a. Describe a security feature that will allow only current Year 12 students to read or join the chat.

Login with username and password.

Surely a VPN is way overkill for a stupid BBQ planning group? A simple web forum would suffice.

1 mark

State average for this question was 65%

b. The committee will use photos taken by parents of Year 12 students performing in the school's concert to promote the barbecue.
List two things the committee should consider before using these photos.

  • Do they need the permission of the students (for privacy reasons)?
  • The file format of the pictures. Can their software open them (e.g. if they're in RAW format)?
  • The size of the pictures. Do they have the bandwidth or storage capacity to communicate them?

2 marks

State average for this question was 68%

 

Question 4


Jack manages work files for a virtual team of coaches using the folders shown below.


a. Write the directory path for a file X in the Finance folder shown.

\\coachserver\Reports\2009\Finance\X

I wonder how lenient the markers will be. Not many kids, I think, will be familiar with the \\servername notation, and if students use forward slashes, will they be punished?

1 mark

State average for this question was 50%

Jack needs a new folder for netball photos used in this year's reports,

b. Where on this diagram would you place this folder?

i. Folder location

Connected to the right of the SPORT shape.

ii. Justify your answer.

Photos belong in the images folder because they are neither reports nor emails.
They belong in the current year (2009).
They then belong under the heading of SPORT because netball is (duh) a sport.

1 + 1=2 marks

State average for this question was 83%

Jack has received a file called winners.doc to check. It is marked Read Only. He asks the Help Desk how he can add new text and send an edited file back to the coaches.

c. List the steps the Help Desk should advise Jack to follow.

1. Open a file manager, locate the file, right-click it, select Properties, clear the "read only" box.

2. Open the file in a word processor, make his changes and save it again (preferably with a "version 2" added to the name)

3. Open his email program, attach the document to the email, address it to the coaches and send it.

This was a bloody silly question. Three steps? To reset a read-only flag, add new text and send the file back comprises at least 12 steps to do it properly!
Did the examiners want this instead...

1. Reset the read only attribute.
2. Edit the document.
3. Email it to the coaches.

Can you imagine the screaming if the help desk actually gave just 3 steps? This unreasonably vague and silly question needed more thought and guidance for students.

3 marks

State average for this question was 47%

d. The virtual team use an online application such as a wiki to write possible rule changes.

GRAMMAR ALERT: The virtual team uses an online application. One team, collective noun - singular! Who's proof-reading these things anyway??

i. Describe how information is added to this online application.

Contributors log in to the site hosting the wiki, and select the document to edit. They choose which part of the document they wish to edit, and they make their changes. Several users can edit a document simultaneously (but not the same part of the document [I believe - do different wiki programs behave differently?])

What else do the examiners want students to say? "It's typed in."?

ii. Explain how the accuracy of the information is assured.

It is proof-read by the people who make up the rules to ensure it's accurate, complete, relevant, unambiguous etc. It can be spell-checked.

Hopefully, it's proof-read better than this exam has been.

Spell-checking is often called 'validation', but I'm wondering if it really is. While spell checking sort of tests if a word exists in a limited list (of correctly spelled words in the dictionary), it does not check the reasonableness of the words (e.g. type, existence, range). But, then again, it does check input data but it's not testing the accuracy of a calculation. I'll ponder on this for a while...

1 + 1=2 marks

State average for this question was 38%

 

Question 5

The VROOM racing car development team has drivers, pit crews and mechanics using a network to communicate during design and testing.
The network manager wants to use a firewall and encryption within a security plan to protect information communicated between the team members.

Describe the function of each and identify a weakness,

i. Firewall

It monitors a computer's communication ports to detect and block unauthorised incoming and/or outgoing information transfers (e.g. port sniffing or transmissions by Trojans). It protects a computer against 'hackers.'

Weakness

  • Some firewalls only protect against incoming, rather than outgoing traffic.
  • Software firewalls add extra work for the computer to do, so it will slow down a bit.
  • Firewalls don't protect against computers within the LAN, only those outside.

ii. Encryption

Makes information unreadable to unauthorised people.

Weakness

  • Adds an extra step of work.
  • If the encryption method requires a decoding key to be used, the key can be lost (so authorised people are locked out) or stolen (so unauthorised people gain access)
  • Encryption and decryption add extra work for the CPU to do and will slow down the computer.

2 + 2 = 4 marks

State average for this question was 49%

Question 6

Jo uses a spreadsheet to manage customer data for selling downloaded music. CDs are mailed to customers who do not have an email address.
Jo wants to use a screen mock-up to represent the customer input screen, a. List one advantage of using a screen mock-up.

1 mark

State average for this question was 60%

It gives a realistic impression of the relative sizes, positions, colours, orientation of the finished screen without having to spend a lot of time actually creating it.

Jo creates a macro to decide if customers receive an online download or are sent a CD in the mail.

b. Recommend a design tool Jo can use to represent the IF statement in the macro. Justify your answer.

Flowchart or Nassi-Shneiderman chart. Both charts are useful for designing processes and command flow such as that in an IF decision.

2 marks

State average for this question was 15% - a shocking result for a disastrous question!

This is a very strange one. Does Jo download the music and sell it, or do the customers download the music?
How is the email address relevant? Would she email music to customers who do have an email address? Ridiculous!

If CDs are sent out, it means the customers are not downloading the music, but Jo is - which is probably a copyright violation.

And if it's a legitimate music download service, who in their right mind would be using a SPREADSHEET to manage it?
This is absurd! What sort of VCAA memos have the exam writers been smoking?
I can't make any sense of this case study at all. I want to know who proof-read and test-sat this thing because I have a rabid poodle with their name on it!

Fortunately, the absurd case study was completely irrelevant to the answer - the only thing that saved it from a SHMACKO.

 

Question 7

The owner of a new forensic laboratory will be responsible for many computer files used by the police. Each scientist's workstation will need physical, electronic and biometric security. Select one example from each type of security and describe how it protects the data and information on the workstation hard drive.

Physical

Electronic

Biometric

• Window bars
• Padlocked processor case

• User name
• Password

• Iris scan
• Voice recognition

Physical example 1-Window bars

Description 1

The bars physically deter people entering the room containing the workstations so the people cannot steal the computers (and the data) or damage the computers (rendering data unreadable). They also cannot get to the computer to log in and copy, delete or change data.

Electronic example 1-User name

Description 1

It requires a user to provide an ID that either identifies them personally (or, sometimes, as a member of a group). Without a correct usename the person cannot login to the network or computer. Usernames are invariably used with matching passwords because they're very weak security by themselves.

Biometric example 1- Iris scan

Description 1

The iris scanner captures an image of the pattern of the coloured part at the front of the eye. This pattern is unique. The pattern is digitally mapped to a simpler form and compared to the official recorded scans of authorised users. Only people authorised to access the data on the network or computer are given access to the data.

Physical example 2-Padlocked processor case

Description 2

A padlock secures the case's lid so the unauthorised people cannot reach into the case. This prevents unauthorised people removing and copying or stealing hard disks containing data, or shorting out the BIOS battery to remove the BIOS bootup password protection.

Electronic example 2-Password

Description 2

A secret code known only to a person who is authorised to access a computer, a network or a data file. It is usually used in conjunction with a corresponding username, and both the username and matching password must be given to gain access.

Biometric example 2-Voice recognition

Description 2

A person speaks into a microphone and their speech is analysed by software to detect distinctive features. These features are compared with authorised people's stored voiceprints. If voiceprints match, the person is given access. Voice recognition is a relatively unreliable form of biometric ID since voices are easily impersonated, and people's voices naturally change frequently due to their mood, health, breathlessness etc.

3 marks

State average for this question was 82%

A pretty simple question for a final exam, one would have thought.

 

Question 8


A small secondhand car dealer in Victoria has a yearly turnover of over 3 million dollars. He collects, stores and disposes of car registration and drivers licence data as a normal part of selling cars.

a. State a law which covers the car dealer's responsibility for this information.

The Privacy Act (1988)

Because the dealer turns over more than $3 million a year.

For once the examiners have actually given basic, relevant info about the Privacy Act question so students can answer confidently!

1 mark

State average for this question was 15%

b. Describe a three-step procedure the car dealer must follow when collecting and storing this information.

1. Only collect data relevant to the transaction being carried out, or as required by law.

1 and a bit. Make sure the data is accurate, complete and up to date.

2. Not use a customer identifier that is used by another data holder.

2 and a bit. Take reasonable steps to protect the data against damage, loss or unauthorised access.

3. Make available a document that clearly sets out what information is collected and how it is used.

I don't get it. A procedure is a structured series of actions to accomplish a task. It requires actions to be in order. Three steps (and only three) - in order? The question is fishing for Privacy Principle knowledge, I suppose, but how do get only 3 steps, and what order do they go in? Does offering a privacy statement come before or after taking reasonable steps to protect data from misuse?? Very odd.

3 marks

State average for this question was 43%

c. The registration and licence data is saved only to a flash disk.

Recommend an efficient method for correctly disposing of electronic copies of this information. Justify your choice.

Method: Hitting the flash disk with a very large iron hammer.
Justification: It's very quick. One or two mighty blows will render the information inaccessible.

If the examiners don't accept that, I'll be annoyed :-)
Alternatively, one could say:

Delete the files, wipe them with a disk-wiping utility, reformat the flash disk... then hit it with the aforementioned hammer.

2 marks

State average for this question was 33%

 

Question 9

The screen shot shown below is a section of the home page of the Purity Water Company.

Layout and Relevance are two design elements to be evaluated in the website shown above.

a. Describe how each of these design elements have been applied in this website.

Layout

Heading is bold and appears at the top.
Nav bar is shaded to make it stand apart from the other material on the page.
Key information is vertically aligned in the middle of the screen with bold headings.
Plenty of white space means information is not crowded, small or hard to find.

Explanations

Bold headings clearly identify the content of the material below, making information easier to find.

Highlighted navbar clearly identifies the text there are being different to other text in that it can be clicked.

Aligning related items reinforces the fact that they belong together.

White space allows items to be visually separated and made more distinct. It can also group related items (e.g. the four squares each have an icon, a bold heading, the "click for" text, then the description of the information that is linked to.

Relevance

All of the information on the screen is related to the products and services offered by the water company. e.g. The navbar links are the sorts of things people would expect to find on such a page.

Explanation

Irrelevant information wastes space and confuses people who must try to work out why it's there. Visitors want a site to deliver the information they expect to find there, and they expect to be able to find that information quickly and easily.

6 marks

State average for this question was 46%

b. Identify one audience characteristic that has been considered when producing this website. Explain how it has been considered.

One characteristic is that visitors would be concerned about how to reduce their water consumption to help the environment. It has been considered by offering ideas and services to help them achieve this aim (e.g. how to reach a lower water usage target, and how to exchange their showerheads.)

A terribly boring question.

2 marks

State average for this question was 48%

 

Question 10

Sections of the Gantt and PERT charts used to monitor a project are shown below.

a. Draw in tasks Q R S and T and complete this section of the PERT chart.

4 marks

State average for this question was 65%

b. i. Identify the tasks on the critical path and its length.

Tasks

P,R,S,T

Length

10 days

ii. Identify the task with slack time and state the length of the slack time.

Task

Q

Length

5 days

The dummy task after Q is really necessary to finish the chart off neatly. It indicates a dependency with no actual work to do. In other words, the project cannot finish before Q finishes.

2 + 2 = 4 marks

State average for this question was 54%

 

Question 11

UPod is an online company selling podcasts. The table below is used by UPod to keep track of its stock.
Podcast: Table

ProductID Product Name Supplier Category Unit Price $ Units in Stock Reorder Level

1

Podcast 1

Exotic Podcasts

Metal Concerts

18.00

23

20

2

Podcast 2

Picatooth Podcasts

Pop Concerts

10.00

14

15

3

Podcast 3

Bunny Podcasts

Classical Concerts

97.00

23

20

4

Podcast 4

Picatooth Podcasts

Pop Concerts

21.30

34

30

5

Podcast 5

Picatooth Podcasts

Pop Concerts

16.50

56

30

6

Podcast 6

Bunny Podcasts

Classical Concerts

38.00

24

20

7

Podcast 7

Bunny Podcasts

Folk Concerts

9.00

35

25

8

Podcast 8

Specialty Podcasts

Musicals

75.00

28

20

9

Podcast 9

Specialty Podcasts

Musicals

12.00

19

15

 

Units in stock? What is this? Podcasts are electronic!
You don't put them on shelves like shoes and spanners!

Golly. iTunes must require a shed the size of TASMANIA!
Perhaps they stock licences, but that's never mentioned...

 

 

a. i. Which field could be used to locate the number of podcasts in stock?

Duh - "Units in Stock"???

This question insults the intelligence of ITA students.

ii. Which fields could be used to calculate the total value of podcasts in stock?

Unit price, units in stock.

1+2 = 3 marks

State average for this question was 85%

b. Write a query or search rule to show the podcasts supplied by Bunny Podcasts.

(Filemaker) In Find mode, type "Bunny Podcasts" into the supplier field and hit ENTER.

1 mark

State average for this question was 30%

Examiners: you have to accept that. It's how Filemaker does queries. It's not a scripted action.

In a script one could enter Supplier = "Bunny Podcasts" but that's only one way to do it.

c. The manager of UPod needs to know when stock gets to the reorder level.

i. Write the rule for a query or search that returns a reorder alert message.

IF(Units In Stock <= Reorder Level)

Again, that's how a Filemaker script would do it (minus the action to take if the test is true)

ii. Provide test data that sets off this reorder alert message.

Product ID = 1

Units in stock = 20

Should trigger the alert. Note the alert should arise if quantity is EQUAL TO or less than the reorder level. The reorder level is the trigger.

1 + 1=2 marks

State average for this question was 30%

 

 

The table below stores details of UPod's Australian suppliers.
Australian Supplier: Table

SupplierlD

Company Name

Contact Name

Contact Title

Street Address

City

Postcode

1

Exotic Podcasts

Sue Downs

Manager

12 Cafe St

Mel

3112

2

ABX Products

Rob Lore

Sales

3 Harbour CI

Syd

2005

3

Bunny Podcasts

Alan Green

Marketing

81 Runway St

Mel

3245

4

NewAge Podcasts

Gino Carli

Sales

123 River Hwy

Ade

5001

5

Specialty Podcasts

Andy Smith

Manager

22 Sandy St

Per

6101

6

Country Podcasts

Bruce Jones

Manager

34 Olive Gr

Mel

3021

7

Picatooth Podcasts

Alex Con

Sales

26 Cook Ave

Syd

2245

8

Children's Podcasts

Karen Owen

Manager

437 West Rd

Syd

2011

 

d. Hand draw an input form for UPod to add a new Australian supplier to the table shown. The company standard font is Arial size 14. Background colour is grey.
(75% of the page was left for students to draw in.)


3 marks

State average for this question was 40%

It's a bit vague what they wanted: just a drawing or a proper mockup with formatting information shown as well. They really should give students a bit more guidance. I added the extra information just to be on the safe side.

When Sam's fifteen-year-old brother Gino ordered a podcast from UPod, UGambling sent him the following email.

e. Identify an ethical dilemma for the management of UPod and UGambling raised by this email.

i. UPod management

Should we profit by providing contact information to Ugambling if we don’t know the age of our customers?

ii. UGambling management

We may be sending promotional gambling material to children or gambling addicts who might be badly affected or influenced by the material.

iii. Write a question you would ask the management of UGambling about sending this email to a teenager.

Do you know that the recipient was a child below the legal age to gamble and what effects this email might have had on him?

How did you get this child's email address?

1 + 1 + 1=3 marks

State average for this question was 55%


 

Question 12

The section of the Delivery Costs spreadsheet below shows the delivery cost and weight of each item to be delivered to customers.

Costs are calculated by the weight of each item using the following rates.

1 to 20 kg is $10
21 to 50 kg is $30
over 50 kg is $40

a. Write the most efficient formula to calculate delivery cost in cell D6 that can be replicated or dragged down cells D7 to D9.

Where range F8:G11 is named 'TABLE'...

=VLOOKUP(C6,TABLE,2)

1 mark

State average for this question was 15%

None of this $F$8:$G$11 rubbish!
Again, I dare the examiners to reject the 'named range' version as long as the named range was defined by the student.

As Bobby has pointed out, the examiners have once again (e.g. 2007 question B11) screwed up a VLOOKUP question. If you check the lookup table, it's just wrong. It would need to look like this to return the desired values...

And no - nested IF is never a good idea!

Late goof alert

Sick dog!

4 November 2010 - a wise little bird has pointed out that the examiner's report gave this answer:

=VLOOKUP(C6, $F$8:$G$10,2) or =VLOOKUP(C6, F$8:G$10,2)
These were the most frequent correct responses. Other correct responses were also awarded a mark. Most students had difficulty in writing this formula.

Obviously the formula was supposed to refer to G11, not G10. Quite ironic that the examiners complained about the students having difficulty writing formulas!

 

b. The manager needs an alert in the worksheet if the Total Weight of all items in a delivery is greater than 900 kilograms.

i. Write a formula for an alert.

=IF(C12>900,"ALERT - TOTAL WEIGHT IS OVER 900kg!", " " )

A bit repetitive. We've done this sort of IF thing earlier... twice. In A9 and B11c(i). This is the third time!

ii. Recommend a cell where you would place an effective alert.

D12

Justify your answer.

It's right next to the piece of data that is causing the alert, thereby indicating the cause of the alert.

iii. Provide one value of test data in an appropriate cell that would trigger your alert.

Cell

Test data

C12

901

1 +(1 + 1)+ 1 =4 marks

State average for this question was 50%

Again - test data has already been examined in B11c(ii). Are they running out of key knowledge to test??

The manager has designed the worksheet below to keep track of the delivery statistics.
A reference to the Delivery Cost worksheet on page 17 automatically returns the correct value to D6 on the
DeliveryStats worksheet below.

c. Write the reference formula that places the correct value for Total Weight in the DeliveryStats worksheet.

=TOTALWEIGHT (where cell C12 on the DeliveryCost sheet has been named 'TOTALWEIGHT')

They want me to use that stupid sheet!cell format. Well, I refuse!

I never EVER use worksheet names in references. It's ugly and stupid and unnecessary.
I always name important cells and use the name anywhere in a workbook to identify a cell's location without caring about the sheet it's on.

If the examiners refuse to accept my answer, again I'll be kicking VCAA heads from here to Footscray.
They would be punishing efficiency and class for their own mundane and unskilled dopy method.
As long as the student correctly indicates the naming being done, they should get FULL MARKS! Grrrr!

1 mark

State average for this question was 10%

 

d. The warehouse has kept statistics of petrol used each month.

i. Describe how this information should be presented in a yearly report.

A pie chart.

ii. Justify your answer.

It would clearly show the annual usage of petrol by month making it clearer which months contributed most to the cost.

I guess the examiners would and should also accept bar charts, line charts or even a table as long as it was reasonbly justified.

1 + 1=2 marks

State average for this question was 43%

The manager has designed a new delivery slip for each customer. The slip for Mrs Wright shown below uses data from the worksheet Delivery Cost and another worksheet called Customer Info.

e.

i. Recommend an efficient procedure to automatically create a delivery slip for each customer.

Firstly, stop using a bloody spreadsheet! Export the data to a a database with an output form that can neatly lay out each customer's data.

This is really starting to annoy me. Are they trying to get students to say MAIL MERGE or something equally silly?
This whole question is predicated on inefficiency and incompetence.

Only newbies use spreadsheets to produce individualised documents like delivery slips or cheques.
If the examiners expect students to say mailmerge, I'll post a rabid poodle to VCAA headquarters to bite their ankles until they get it right.

See below if you want to join in the fun and try to create the spreadsheet described above.

ii. Justify your answer.

Because using mail merge is inefficient, and spreadsheets really SUCK at producing individualised mass output. The whole idea of doing this in a spreadsheet is ludicrous. I refuse to go on because this is getting too silly.

1 + 1=2 marks

State average for this question was 33%

Ah, thank dog I got that off my chest!

This question was originally awarded a Sick Dog Award, but I've upgraded it to a SHMACKO for its implied advocation of a ridiculously inappropriate IT technique. If the examiners' report proves they had some other technique in mind, I will retract the SHMACKO...

But for the life of me I can't think of any other method except for mailmerge.

END OF QUESTION AND ANSWER BOOK

 

It's amazing! B12 has earned two Shmackos and a Sick Dog Award all by itself!
The only thing it missed was an Illiterate Award.
I have a feeling this question will go down in history and soon enter to be inducted into the Crappy Question Hall of Fame along with question A5 from 2005!

Overall

Too easy.
Repetitive.

Bad grammar.
Unrealistic or confusing case studies.
Assumes very unsound or amateurish IT practices are 'efficient'.

I am not impressed. Why - year after year - do such ignorant and vague/confusing questions still appear on the ITA exam? Something needs to be done about it. It's embarrassing to all of us who try to seriously promote ITA as a respectable VCE study.
I'm heartily sick of apologising to my students for bad VCAA exam questions, and wasting time training them how to tackle really awful questions.
As a service to VCAA, I offer these amazingly erudite tips...

1. Hire someone who can construct a sentence in proper English.
2. Get someone who really KNOWS how to use IT tools efficiently.
3. Don't cover the same concepts (e.g. test data) more than once.

 

Play the B12 spreadsheet game!

Fun for the whole family

The challenge is to create the delivery docket spreadsheet exactly as described in the ITA exam question B12e

without using mail merge!

And since the question says for you to "automatically create a delivery slip for each customer",
it means each customer, not just one.
And it should be automatic, not manual.

Best of luck.

A spreadsheet starting point is available for anyone who wants to play. It's the best I could manage. Ignore it if you prefer.
Remember: there should be no blank lines in the list of items on the delivery slip.

Let me know how you go.

 

Back to the IT Lecture Notes index

Back to the last page you visited

Created 11 November 2009

Last changed: November 19, 2014 1:02 PM

VCE IT Lecture notes © Mark Kelly 2001-

Original Content © Mark Kelly 2009
Images and questions © Victorian Curriculum and Assessment Authority 2009. Reproduced here with permission.