VCE IT Lecture Notes by Mark Kelly

 

Software Development

VCAA Exam Post Mortem

2011

VCE IT Exam Post Mortem

   

Other VCE IT Post Mortems to enjoy

ITA/Informatics - 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017


SD - 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017

Post Mortem Notes

This is not a VCAA publication!
I do not speak for the VCAA, the IT examiners, or exam markers.
I was not involved in the setting or marking of this examination.
Extracts from exams are all Copyright © VCAA, and are used with permission. Thanks, VCAA!
Use these post mortems at your own risk.
I reserve the right to change my mind completely, at short notice, about anything I've said here.
Suggestions, discussions and corrections are welcome.
If any third-party copyrighted material has inadvertently been used, please let me know

Questions are in black.
My suggested answers are in blue.
My editorial ramblings about the exam are in blue italics.
Examiners' report comments are in red italics.
Purple shows the explanation of an answer.

Examiners' comments added 15 May 2012

The Post Mortem Awards

The SCHMACKOS award is given to questions that are a complete dog's breakfast.

The Questions That Make You Sick As A Dog Award
Questions that are not totally wrong, but are just dumb
or are wrong in a way that does not jeopardise the answer.

 

And the exciting Illiteracy Award.

Written examination

Thursday 17 November 2011

Reading time: 11.45 am to 12 noon (15 minutes)

Writing time: 12:00 noon to 2:00 pm (2 hours)

 

Number of questions

Number of questions to be answered

Number of marks

A

20

20

20

B

6

6

20

C

16

16

60

Total 100

  • Students are permitted to bring into the examination room: pens, pencils, highlighters, erasers, sharpeners, rulers and one scientific calculator.
  • Students are NOT permitted to bring into the examination room: blank sheets of paper and/or white out liquid/tape.

Materials supplied

  • Question and answer book of 21 pages with a detachable insert containing a case study for Section C in the centrefold.
  • Answer sheet for multiple-choice questions.

Instructions

  • Remove the insert containing the case study during reading time.
  • Write your student number in the space provided above on this page.
  • Check that your name and student number as printed on your answer sheet for multiple-choice questions are correct, and sign your name in the space provided to verify this.
  • All written responses must be in English.

At the end of the examination

  • Place the answer sheet for multiple-choice questions inside the front cover of this book.

Students are NOT permitted to bring mobile phones and/or any other unauthorised electronic devices into the examination room.

 
During the examination, students should:
• endeavour to use correct IT terminology
• discuss all options when asked to justify a choice or compare one option to another
• know how to respond to key instructional terms in questions, such as 'state', 'explain', 'justify' or 'describe'
• reread each question and their response to ensure the question has been answered
avoid using pencil in Sections B and C as responses in pencil can often be difficult for assessors to read
• read the case study and questions carefully and underline or highlight key words
• endeavour to demonstrate their knowledge of the subject and apply that knowledge to the case study, as
generic responses often result in low or no marks.

SECTION A - Multiple-choice questions

Instructions for Section A

Answer all questions in pencil on the answer sheet provided for multiple-choice questions.
Choose the response that is correct or that best answers the question.
A correct answer scores 1, an incorrect answer scores 0.
Marks will not be deducted for incorrect answers.
No marks will be given if more than one Answer is completed for any question

Question 1


The stages of the problem-solving methodology are

A.  analysis, design, document, report.
B.  analysis, design, development, report.
C.  analysis, design, development, evaluation.
D.  analysis, solution, development, evaluation.

Answer is C.

As usual, an easy one to start with.

97% got this right.

 

Question 2


Michael is getting an Internet connection in his home and wants to set up a network so all the family can access the connection. He has a PC in his home office; his wife has a laptop she likes to use in the lounge room. Both of his children have netbooks for school that they use in their bedrooms and often in the family room.

From the family's point of view, which characteristic of a wireless network most suits their needs?

A.  cost
B.  security
C.  mobility
D.  bandwidth

Answer is C.

The only factor alluded to in the case study is that they use their netbooks in more than one location.

61% got this right.

 

Question 3

The diagram that best represents the Open Systems Interconnections (OSI) model of network architecture is

A
B
C
D

application

application

application

application

data link

data link

presentation

presentation

network

network

session

session

transport

physical

transport

transport

session

presentation

network

network

presentation

session

data link

physical

physical

transport

physical

data link

Answer is C.

Programmers Do Not Throw Stale Pizza Away

72% got this right.

 

Question 4

Miklos is writing a program for a mobile phone.
With which layer of the OSI model will the program directly interact?

A.  physical
B.  network
C.  data link
D.  application

Answer is D.

The application layer is the highest layer, closest to the user - and applications!

67% got this right.

Question 5


An example of an evaluation criterion that measures the effectiveness of a newly developed software solution to process invoices would be

A.  processing speeds have increased by 35%.
B.  the time taken to process items has reduced by 50%.
C.  the number of staff required to process items has been halved.
D.  the accuracy of invoices generated by the new software has improved.

Answer is D.

The key word in the question is effectiveness. Processing speed, time and staffing are all efficiency measures.

78% got this right.

Question 6

User documentation that would be the most appropriate for worldwide customers using a new web-based booking system would be

A.  online user help.
B.  a procedures manual.
C.  a printed quick start guide.
D.  a technical specifications manual.

Answer is A.

It has to be online for use by worldwide web customers.

91% got this right.

 

Question 7


What is the correct output for the following algorithm?


A.  4,5
B.  5,4
C.  16,6
D.  6, 16


Answer is D.

This is how I deskcheck things algorithms like this...

Begin loop 1 loop 2
a <- 4 a=4  
b <- 2 b=2  
repeat    
a <- a+1 a= 4 + 1 = 5 a= 5 + 1 = 6
b <- b*b b = 2 * 2 = 4 b = 4 * 4 = 16
until b>a no - 4 < 5 so next loop... yes, 16 > 5 so drop down
display a,b   6,16
end   yippee

73% got this right.

Question 8


What is the correct output for this algorithm?

A.  SueBill
B.  FredBill
C.  Bill Sue
D.  Fred Sue

Answer is A.

Again, step through the code like you were the compiler.

Name is a 1 dimensional array.

if a=2 and b=1 then we're joining name(1) 'SUE' and name(2) 'BILL' to make SueBill.

It's good to see emphasis on actual programming. After all, that's what the course is supposed to be about!

87% got this right.

 

Question 9

In a program, a line of code that modifies a variable's content is best described as a

A.  function.
B.  procedure.
C.  instruction.
D.  control structure.

Answer is A, officially. I chose C, and I can't see why that's not at least equally if not more correct than A.

After I raised this on the SD teachers' mailing list, this message arrived from Paula Christophersen, Manager of IT at VCAA...

Thank you for raising your concerns about this question. I have checked with the Examinations Unit and Option C for Question 9  was marked as correct, however, a publishing error has occurred on the website, inadvertently showing Option A as the correct answer. An updated version will be posted shortly.

Once again, thank you for your sharp minds.

So, the answer is C, officially. I chose C, and so did 13% of students. Out of interest, 45% chose the incorrect A option!

 

 

Use the following information to answer Questions 10-13.

The manager of the SmallBank Company phoned Michelle and asked her to write a program for a mobile phone for the bank. During their short conversation, the manager specified that the program must cater for visually impaired people as well as people with normal vision. It will be available to customers via the bank's website. The manager also indicated that the bank was only trialling this idea. This means Michelle must focus on making the required functions work properly and not spend time adding extra functions to the program. Michelle agreed to write the program and was given 60 days to create a solution that would meet the bank's needs.

 

Question 10

Before Michelle can begin designing the solution, she has to determine exactly what the program is required to do. The most appropriate method for her to collect data about what the program is required to do is to

A.  conduct a survey of the bank's customers.
B.  interview the SmallBank Company's manager.
C.  investigate the mobile phone's technical specifications.
D.  observe another bank's customers using a similar program.

Answer is B.

Only the bank's manager knows what he wants the app to do.

62% got this right.

 

Question 11

The constraint on the solution that will most influence Michelle's design is that

A.  the bank is trialling this idea.
B.  she has been given 60 days to create the solution.
C.  she should not spend time adding extra functions.
D.  the solution must cater for visually impaired people and people with normal vision.

Answer is D.

The app must be accessible to those with visual handicaps.
B is a time constraint, but it won't really affect the way she designs the software.

64% got this right.

 

Question 12

The factor that will most limit the scope of Michelle's solution is that

A.  the bank does not want her to add extra functions.
B.  the program will be made available via the bank's website.
C.  the bank is only small and does not require a complex program.
D.  the program must cater for visually impaired people and people with normal vision.

Answer is A.

She has been specifically instructed to not add features, and the number of features is the software's scope.

58% got this right.

 

Question 13

Michelle has completed her analysis and written the Software Requirements Specifications (SRS) for the bank. It lists all the tasks that must be undertaken in order to successfully complete the project.

The best order to undertake three of these tasks is

A.  survey a sample of customers; test the program; write internal documentation.
B.  write internal documentation; test the program; survey a sample of customers.
C.  test the program; survey a sample of customers; write internal documentation.
D.  test the program; write internal documentation; survey a sample of customers.

Answer is B.

Internal documentation and testing are done during development.
The survey of users has to be for evaluation, so it comes last. It can't be for analysis since that's already finished.
The steps in B reflect development (writing internal doc + testing) and evaluation (survey).

50% got this right.

 

Question 14

Which statement best describes the purpose of the Open Systems Interconnections (OSI) physical layer?

A.  to route a packet of data through a network to a remote location
B.  to move individual data bits across a shared medium to another point in the network
C.  to ensure that packets of data are assembled and presented to an application in the correct order
D.  to ensure that packets of data received from another point in the network are free of any errors caused by the medium connecting the two points

Answer is B.

The physical level is as basic as communications can get - shunting bits over wires. All of the other activities require higher levels of intelligence and organisation.
A = IP
C= TCP
D= Checksum calculation in TCP.

42% got this right.

 

Question 15

Nola's and Ben's computers are part of a network. Recently Nola's computer became infected with a worm. Which statement is most correct?

A.  The worm will not spread to Ben's computer because it is not a useful program.
B.  The worm will spread to Ben's computer only if Nola sends an infected file to Ben as an email attachment.
C.  The worm will spread to Ben's computer only if a copy of one of Nola's infected files is opened on his computer.
D.  The worm will spread to Ben's computer by sending a copy of itself through the network and infecting one of his files.

Answer is D (or B maybe)

This is not an easy one. After all, the naming and behaviour of malware is not defined by IEEE or Australian standards. Worms, as I understand it, are self-contained code that travels by email. Viruses attach themselves to executable files and travel with them.

Option A is just silly.
B specifically mentions email, which is how I understand worms propagate. I may be wrong about whether they only use email.
C assumes worms attach to files, which they don't. Maybe. If they're self-contained, they do their damage like normal exe files.
D is possible, but worms don't travel alone. They need a medium, like email.  Maybe. Perhaps.  I'll have to look this up!

There's debate about this question, about whether worms can travel without email, and whether they infect files or not. The consensus seems to be going for D. I'll have to see if there's an authoritative source of info about worms...

63% got this right. Official answer was D.

 

Question 16

Which of the following is not a feature of a Virtual Private Network?

A.  has high-level data security
B.  connects multiple locations
C.  may use public telecommunications infrastructure
D.  relies on leased telecommunications lines to connect

Answer is D.

VPN's main attraction is that you don't need expensive leased lines like companies had to use in the old days. With VPN, you get a private communication channel using standard internet infrastructure. The privacy is attained with a VPN box at each end of the connection to manage encryption.

54% got this right.

 

Question 17

The principal of a secondary college is considering purchasing some new software to enable teachers to mark the roll quickly at the start of each lesson. He has downloaded a trial copy of QuickMarkT and notes that it only uses three different screens. What is the most important characteristic the principal should look for in this software?

A.  use of multimedia
B.  consistency of navigation
C.  lengthy on-screen instructions
D.  a pleasing and colourful design

Answer is B.

I don't like the answer, but it's the only possible one.
If there are only three screens, navigation could not be too difficult, could it?
If the other options weren't even more inane, I would've gone for one of them instead.

88% got this right.

 

Question 18

Consider the following stack, where STACK holds the values and TOP indicates the current position of the top of the stack.

The following three operations are carried out on the stack in the order

1. Push (21)
2. Push(10)
3. Pop

Which of the following is the correct stack at the end of the three operations?


Answer is D.

Working it through...

  starting point PUSH 21 PUSH 10 POP
TOP >>> 2 3 4 3
5        
4     10 10
3   21 21 21
2 35 35 35 35
1 62 62 62 62

Notice that the 10 remains in place after the POP, and only TOP is changed. This is because it takes far less processing to modify the stack pointer than it is to physically move data in memory. So the 10 stays where it is, and the stack effectively pretends it isn't there. If there were another Push, slot 4 would be overwritten with the new data and the 10 will finally go to stack heaven.

51% got this right.

 

Question 19

A data structure in which the first data item entered is always the first item removed is known as

A.  a stack.
B.  an array.
C.  a queue.
D.  a record.

Answer is C.

Queues store and release data in the order it arrives.

83% got this right.

 

Question 20


A program is being written for a hand-held touch-screen device with no physical keyboard. It will allow the user to look up facts about any country in the world (there are about 200). The user will be able to choose from the five languages shown.

To find information about a country, the user will have to input the name of the country in the chosen language. To make the input as efficient as possible for the user, the programmer should write code that

A.  gets a selection from a scrollable list.
B.  gets a selection from the display of a world map.
C.  gets a selection from a list that is matched to characters as they are entered by the user.
D.  reads the country name from a single text box that has had the name entered into it by the user.

My answer is B. Official answer was A.

A is feasible, and avoids the user having to enter (and possibly misspell) the name of a country. It would take a lot of scrolling to get through 200 countries, so it would be less efficient for the user.
B would be intuitive to users, but selecting tiny countries like Israel or Vatican city could be difficult on a small display!
C and D require users to type country names, and that means trouble for Chinese and Japanese characters. It would take a lot of extra programming to handle non-Latin alphabets (but this is not relevant to the issue of the user's efficiency.)

34% got this right.

 

SECTION B - short answer questions

 

 

Question B1

Maria has a program that works well on her laptop and she would like to put it onto her Personal Digital Assistant (PDA).
Other than the operating system, state two important characteristics of the PDA that will need to be considered when she modifies her program to work on the PDA.

  • Screen resolution - a single laptop display may need to be divided into several screens' worth on a PDA
  • Available memory
  • Available secondary storage
  • Data input devices
  • CPU speed
  • Battery consumption of a hard-working CPU
  • Bandwidth requirements


2 marks

State average was 68%

Characteristics that will need to be considered include (two of):
• size of RAM
• size of screen
• processing speed
• screen resolution.
Most students were able to provide a reasonable response to this question.

 

Question B2


As shown in the diagram above, data flow diagrams (DFD) and use case diagrams (UCD) share similar symbols, but their purposes are not the same.
a.   Describe the difference in purpose between the arrowed line in the DFD and the straight line in the UCD.

  • The DFD's arrow indicates the direction of data flow, unlike the UCD's association line which is bidirectional.
  • The DVD's arrow indicates a single piece of data. The UCD's line shows all sorts of data flows.
  • The arrowhead in a UCD is used to indicate who initiates the use case, and not the direction of data flow.

2 marks

State average was 60%

While it was clear that most students had studied both diagram methods, many were not able to clearly articulate the purpose of the lines or the purpose of the circle/ellipse in each diagram. Students should be able to read, draw and write about each of these diagram methods.

The following is an example of a high-scoring response.
"The line in a DFD illustrates the flow of data to or from an entity, process or data store, with the arrow indicating direction of flow. The line in a UCD shows that an actor interacts with a specific use case."


b.   Describe the difference in purpose between the circle in the DFD and the ellipse in the UCD.

The DFD's circle is a process where data is changed or manipulated in some way. e.g. Create invoice
The ellipse in a UCD is a called a use case, and shows an action, or unit of functionality in software. It does not have to process data.

2 marks

State average was 55%

The following is an example of a high-scoring response.
"The ellipse in a UCD shows a use case – an interaction that a user has with the system, whereas a circle in a DFD shows a process in the system, where data is manipulated or transferred.".

 

 

Question B3

Brian is a programmer for a large IT services company. He is in charge of the development of a security system for a financial services company that maintains a large credit references database that big banks rely on when people apply for loans. The system is due to be finished in a month's time. Brian's manager has just told him that they will need to deliver it to the customer in one week as he has promised the finance company that it will be ready by then. Brian knows that the testing process will not be finished and that he cannot guarantee the security of the system. He knows that this is not right for the customer, but does not really know what to do about his manager's request.

a.   Explain how a code of ethics could assist Brian in dealing with this situation.

If the programmer's code of ethics specified that a programmer should not deliberately release software that is known to have significant security or safety deficiencies, he could use that as an argument against his manager.

He would also have the backing of his professional association if the manager caused Brian trouble over the issue.

2 marks

State average was 33%

The following are examples of high-scoring responses.
A code of ethics is a document in a company or profession that explains how people in that company or profession can behave in an ethical manner. A code of ethics could assist Brian in knowing what and who to prioritize in his ethical dilemma.

Brian is in an ethical situation, wanting the best for the customer and to obey his manager. A code of ethics is guidelines that all must follow, it can give Brian the reasoning and privilege to not obey his managers demands and follows the rules of ethics towards the customer.

b.   Assuming Brian's organisation has a code of ethics, outline how a decision support framework could assist in resolving this ethical dilemma.

A decision support framework gives decision-makers guidelines on how to behave in given circumstances. If the framework foresaw such a dilemma arising, it could advise both Brian and the manager about what actions would be appropriate or necessary to resolve the problem.

e.g. "If a manager issues instructions that a worker considers morally or professionally unacceptable, the matter should be directed to the head of human resources."

2 marks

State average was 33%

The following are examples of high-scoring responses.
A decision support framework would be an individual/group or possibly document that outlines how to go about resolving the dilemma by suggesting courses of action and outlines what the company believes Brian should do in his circumstance. DSF helps ensure Brian doesn't break the code of ethics, and solves the ethical dilemma legally correct.

A decision support framework is a package of resources that helps to prevent conflicts from occurring, and describe how to resolve them when they do occur. A decision support framework will outline the steps needed to resolve the conflict and Brian can go through these steps which will involve listening to all points of view in order to resolve the dilemma.

A code of ethics and decision support frameworks are part of Unit 4, Outcome 2 and are both new to the study. A code of ethics outlines the values of the organisation and the expected behaviour of employees.
A decision support framework outlines how the organisation deals with an ethical dilemma in order to ensure consistency in the process and the outcomes.

Most students struggled to provide a clear and accurate response to this question, with many simply stating that 'the code of ethics/decision support framework would help Brian'. In this style of question it is important that students provide a definition/description/explanation as well as relate the response to the scenario presented. For example, students should have explained what a code of ethics is, as well as how it was going to help Brian in this situation.

 

 

Question B4

Big O Television's secure computer network was recently breached. Big O Television has hired an independent IT security company, Secure TVtech, to test the security of its network and provide support in identifying and repairing any weaknesses in its security.

A.    Suggest a technique that Secure TVtech might use to test the security of Big O Television's computer network and describe how it would work.

They would carry out a penetration test. Without being given any special knowledge about the system, they would attempt to break into the network from outside the firewall and record the weakness they discover.

2 marks

State average was 63%

Many students discussed a version of ethical hacking to test the security. Students are reminded to use technically correct IT terminology. Many students used terms incorrectly, including white-box, black-box, white/black/grey hat hacker, penetration testing, cracker, etc. Appropriate responses included the techniques of penetration testing or packet sniffing and a technical and accurate description of how the technique works.

b.   Explain how a security audit of the computer network may have prevented the original network breach at Big O Television.

A security audit is a systematic technical assessment of how data security is managed in a system. Unlike a penetration test, which is done without special privileges, an audit is carried out - with full privileges and inside information - within the system to assess security weaknesses. They may use interviews with staff, vulnerability scans, technical inspections, reviewing security policy and procedures, and the use of network monitoring software. The audit may inspect password policies, review audit trails, check the state of security patches on key software, test the disaster recovery plan, etc.

2 marks

State average was 50%

A security audit is a preventative security measure; it not only examines the equipment (hardware and software) but other elements of the information system (people and procedure) to ensure there are no security issues.
For full marks students needed to demonstrate knowledge of the function of a security audit and apply this knowledge to the case study.
The following is an example of a high-scoring response.

A security audit would have involved security experts examining the security of the system to identify weaknesses and gaps in the security. This may have involved the identification of the weakness that allowed the original network breach, thus allowing Big O Television to remove the weakness. The breach therefore may have been prevented.

This question required students to show their knowledge of security techniques and how the techniques may be tested. It is important that students read questions carefully and ensure they are answering the question asked, as a number of students wrote about what security could be implemented. Students are encouraged to highlight or underline key words and phrases in questions during writing time.

Stand by - this is a doozy. Probably the silliest question ever to appear in a Software Development exam.

 

Question B5

Caitlin and Ryan are discussing the best way to store their new software solution and the data files it uses. The software, which company employees will need to access every day, is 80 gigabytes (GB) and uses several data files which will grow in size over time.

Caitlin suggests the software should be stored on the file server and the data files could be stored on DVDs.

Ryan suggests that as the software is not very large (80 GB) it could also be kept on the same DVD as the data files.

The network administrator is not happy with either solution.

Provide a better solution for Caitlin and Ryan and give three reasons to support your solution.

When I first read this, I had to sit down. I assumed it had to be a complex misprint. But no, it's a serious question.  It's hard to know where to start with the massive unreality of this case study.  Caitlin and Ryan should not be let loose from a sheltered workshop, much less working with real IT. 

- Let's start with the software. It's said to be 80G... 80,000 megabytes.  Even Windows 7 is nowhere NEAR 80G!  My entire Windows and Program Files directories only add up to 47G - and I have a lot of programs!  What does this software do - run the planet?

- It's absurd that IT professionals would even for a second consider storing data files on DVD. It means the data must be read-only, but it's said that the files will grow in size over time, so they must be read-write. A hamster would know that. Caitlin doesn't.

- "Ryan suggests that as the software is not very large (80G)..."  What would he consider large?? Ryan should not be allowed anywhere near an information system.

- He wants to store the 80G software on a DVD?  My grandmother had a old rooster who knew that you can only fit 4.7G of data on a DVD. The rooster deserves Ryan's job. And Ryan even wanted to add the read-write data to the DVD as well.  Dear oh dear.

- Next, even if they built a 16 metre-wide DVD to fit 80G of data, how could the software run from there without being installed on a computer? Not much software can run without being installed on a computer. Some software runs on networks, but at 80G, it would take users centuries to get anything done with it.

- Even if the software could be run from the DVD, how will it write new or changed data to the DVD?

Surely the examiners could have come up with a scenario that tested students' technical knowledge just as effectively without turning it into a 'Three Stooges Do I.T.' farce? This question was nearly as bad as an Adam Sandler movie.

Solution

Take Caitlin and Ryan out the back, shoot them, and then terminate their employment.

The 80G software would need to be installed on the hard disks of workstations. The data files could be stored on the file server.

Reasons

  • Read-write files cannot be put on DVD
  • 80G will not fit on a DVD
  • Software cannot usually be run directly from a read-only disk. It needs to be installed on a computer.

1+3 = 4 marks

State average was 66%


Double-Schmacko time!

A significant number of students were able to correctly identify that 80 GB would not be able to fit on a DVD and provide an appropriate, justified solution. The most appropriate solution was to store data on a file server, which a majority of students described; however, a range of other reasonable responses was accepted. The following is an example of a high-scoring response.

Solution: Store the software on the file server and store the data files on the file server.
Reasons:

  • DVDs are not large enough to store a 80GB program so Ryan's suggestion is not appropriate
  • DVD's for data files is not appropriate as the information would take to long to load.
  • The amount of DVD's would also increase as the data files grow over time making them harder to store.
  • Storing all data on a server is better as all data is accessed quicker, more efficiently, memory can be added, easily backed up and archived.

 

Question B6

Wendy and Gareth have been asked to design an intranet for the residents of an aged-care facility. This intranet will provide access to suitable mind-challenging games. It will also allow residents to upload photos and leave comments.
Choose two important characteristics of the users of this website that Wendy and Gareth will need to consider when designing the intranet. State how these will influence Wendy and Gareth's design.

User characteristic - Poor vision

Effect on design - large text, good contrast

User characteristic - Poor fine-motor muscular control

Effect on design - large controls, low sensitivity settings

User characteristic - lack of IT experience

Effect on design - interface must be intuitive, lots of help easily available, avoid jargon

User characteristic - Closeness to death

Effect on design - Make the system fast and responsive, so they can make the most of it in the time they have left.

OK. Maybe not the last one.

2 marks

State average was 55%

Most students were able to identify user characteristics such as vision impairment, physical impairment, education level, experience with technology, etc. and were able to describe how this would affect the design of the website.
However, a significant number of students confused user characteristics with non-functional requirements such as readability or easy navigation.
The following is an example of a high-scoring response.

Visual impairment: will need to design a solution with high contrast and large interface elements to accommodate for the user's impaired vision.
Technical ability: will need to have a focus on user friendliness, as the users will not have much technical knowledge e.g. simple, step by step process.

 

 

Case study

 

Bigton City Car Parking

The large regional city of Bigton has a busy central business district (CBD). Over the last few years parking in the CBD has become a concern. One difficulty is that too many people overstay the time limits of the parking bays in the CBD's streets. Employing enough parking officers has also become a problem, so the Bigton City Council has decided to look for a technological solution to the problem.

City Engineer, James Jones, proposed that the city purchases and installs a commercially available solution that detects vehicles that have overstayed the time limit. However, after examining one such solution, the Council decided that it provided a lot of features the city would never use and it was too expensive. The Council asked James to investigate creating the city's own solution. Its only purpose would be to detect overstaying vehicles and notify parking officers where these vehicles are parked.

After some thought and investigation, James drew the plan shown below.

Parking Infringement Monitoring System (PIMS)

A Car Detection Unit (CDU) in each parking bay detects the arrival (or departure) of a car. When an arrival (or departure) occurs the CDU sends a signal to a nearby Road-side Data Logger (RDL).

The signal identifies the CDU and the presence (or absence) of a car.

At set intervals, RDLs send the data they have collected to a dedicated computer at the Council's offices. This is done via the Internet, using the mobile phone network.

The Council's dedicated computer determines which cars have stayed too long. It then sends the location of the cars and the overstay details to a parking officer's mobile phone.

The parking officer locates each car and confirms that it is the overstaying car. If so, the officer gets the car's details, prints a ticket, and then sends this information to the Council's fines-payment information system.

From time to time the City Engineer will access the dedicated computer to obtain statistics regarding the operation of the system.

During his investigation James found out that the Council gives all its parking officers a mobile phone for use on the job, which means that these do not have to be purchased for the system; they would just need some software written for them. He also found that all the other hardware needed for the system, including a portable Bluetooth printer, can be purchased 'off the shelf'.

The CDUs and RDLs operate automatically, but the dedicated computer would need software written for it. The computer can be connected to the Council's existing network, which would allow it to interact with the Council's fines-payment system.

To take his idea further, James hired programmer Kirsten Koder.

After interviewing James, Kirsten drew a use case diagram of the proposed Parking Infringement Monitoring System (PIMS). It is shown below.

The Car Detection Unit (CDU)

The type of CDU James has decided to use in the system is a small self-contained device about 5 cm long. It is designed to be placed just under the surface of a road. When the magnetic field around it is disturbed by a car, the CDU transmits a data signal that contains a 12-digit code as shown below.

Since 1990, each parking bay in Bigton has been allocated a bay number, as shown in a section of the city map below. Since the CDU ID number is programmed at the factory and cannot be changed, James has decided that the best way to provide its location is to match the CDU ID to the bay number.

Parking bays

 

 

Instructions for Section C

Answer all questions in the spaces provided. Remove the case study insert and read all the information provided before you answer these questions. Answers must apply to the case study.

 

 

Question 1

While looking at the plan drawn by James, the engineer, Kirsten noted that there would be four different data transfers. She also noted that one of the data transfers will not need TCP/IP.
Identify this data transfer and explain why TCP/IP is not needed.

Data transfer from CDU to RDL

Explanation

The transfer is not being routed through the internet like the other three, and to use the internet you must use TCP/IP for packet handling and routing. The transfer might use Bluetooth instead, since the CDU and RDL are said to be "nearby".

1+2 = 3 marks

State average was 52%

Most students were able to identify that the data transfer from CDU to RDL was the one that did not require TCP/IP. However, many students struggled to provide a technically accurate description as to why it was not required. TCP/IP is a protocol for Internet use and the use of the Internet is not required for this data transfer. Stating 'because it is not required' was not sufficient and simply restated the question.
The following is an example of a high-scoring response.

"Data transfer from CDU to RDL
Explanation: The data does not transfer using the Internet. Because TCP/IP is only for data transfer over the Internet the protocol is not required."

 

Question 2

To check that she had understood James' plan, Kirsten showed him the use case diagram. He expressed concern that the dedicated computer was not shown in the diagram.
State why Kirsten did not include the dedicated computer in her use case diagram.

The actors shown in the UCD are external entities that exploit functionality within the system.  Since the dedicated computer is the system it does not interact with itself from outside of itself!

1 mark

State average was 40%

Students had some difficulty with written responses regarding use case diagrams. As use case diagrams are new to the study, teachers are encouraged to provide more questions of this type throughout the year. Appropriate responses made comment about the dedicated computer not being included in the use case diagram because it was not being an actor (but part of the system).

 

Question 3

Kirsten will include the use case diagram in the Software Requirements Specifications (SRS) she is writing.
In addition, Kirsten will include a context diagram in her SRS.

State two functional requirements of the Parking Infringement Monitoring System (PIMS) that this context diagram would show. Give an example of each.

Functional requirement 1 - Calculate if cars have overstayed their parking time.

Example - ? For example, a car stays too long in a parking bay??

Functional requirement 2 - Transfer ticket details

Example - Send ticket data to the fines payment system. (??)

First problem: a context diagram will show no functional requirements. A context diagram doesn't show any processes: the system is a black box.  The CD will only show data flows between the system and its external entities. FRs might be suggested by the data flows, but the FRs themselves are not shown.

Second problem: how can you provide examples of specific functional requirements?
It's not as if FRs are a class, and there are instances of them in the UCD.
So if a FR is "print parking ticket", how do you provide an example of that?

Third problem: a big part of the system is calculating when cars have overstayed their time, but this FR is not shown in the UCD. The closest use case is "register car arrives and/or departures" which is different to calculating the time intervals between the events.

I'm confused.

4 marks

State average was 48%

A range of responses was accepted as long as the student could clearly articulate the functional requirements of the system. Functional requirements include:
• send data from roadside logger to central computer
• CDU detects the arrival/departure of a car
• transfer data from CDU to RDL
• send data to parking officers.
Functional requirements are statements about what the system is required to do; however, when responding to this question, many students confused functional and non-functional requirements. Reliability, robustness and maintainability were common answers, but these are all non-functional requirements.

 

Question 4

When writing the SRS, Kirsten identifies user-friendliness, response rates and maintainability as important non-functional requirements of the system.
Which of these three requirements is the most critical for the success of the system? Justify your choice.

Most critical non-functional requirement - Response rates.

Justification - since the allocation of parking tickets is strictly time-dependent, any lag in getting data on car arrival/departure times could lead to overstaying cars leaving a bay before the parking officer can get there to deliver the ticket.   A responsive system will react in a timely manner to critical events like these.

1 + 3 = 4 marks

State average was 46%

The most critical non-functional requirement in this situation is response rate. When justifying a choice, students who appropriately contrasted response rate with the other non-functional choices generally provided better responses.
It is important that students are conversant with the terminology used in the problem-solving methodology stated on pages 16–18 of the study design. It was apparent that many students did not recognise, or understand, the term 'functional requirement' – part of the analysis stage of the problem-solving methodology.

The following are examples of high-scoring responses.
Justification: The success of the system depends on whether it can inform parking officers of overstaying cars in time for them to give these cars a ticket. The system's response rates will therefore need to be quick enough to get this information to the officers in time for it to be used. User friendliness and maintainability do not necessarily effect whether the system fulfils its purpose, but in this case the response rates of the system are critical to its success,

Justification: Seeing as how the parking officer will need constant updates as the whereabouts of each overstaying vehicle, the response times between detecting an overdue car then the RDL sending this information through to the council's dedicated computer and then on to the parking inspector will need to be very short. How easy the program is to use is irrelevant because there is no handling by users, it is all automatic beside the information received by the officer, and the maintainability, whilst in its own right be an important part, is not considered as it is required but the devices are assumed to be very robust.

The analysis is now complete. Kirsten has submitted the SRS to James and he has told her to begin designing the software for the dedicated computer and the mobile phones.

Kirsten starts with the dedicated computer. It will deal with the use case 'register car arrivals and/or departures'. Kirsten has drawn the following data flow diagram (DFD) to help her with the design of the software.


1. I've always told my kids that each piece of data should have its own arrow. This DFD has multiple data items on the same arrow.

UPDATE - 28 June 2012 - after some research, I can't find an 'official' rule against multiple data items on a flow, but they are nevertheless VERY rare. In one nice slideshow on data flow diagrams I found an example of two data items on one arrow - but that was a higher level DFD, and the two data items were split up into two arrows in the lower level DFD that showed more detail.

2. Aren't double-headed arrows forbidden in DFDs?

UPDATE - 28 June 2012 - Yes. Data flows can only go in one direction!

3. Why are two arrows unlabelled?

Did someone change the DFD rules when I wasn't watching?

For the process 'Determine deadlineTime & cduBattery' she has developed the following algorithm. It updates deadlineTime and cduBattery in cduFile. The variable currentTime is set by the system and represents the current time of day in 24-hour time.

 

 

Question 5

The structure of cduFile is shown in the table below.

Using the information in the DFD, the algorithm and case study, complete the table to indicate the most appropriate data type for each field.

Select from: integer, floating point number, Boolean, array, string.

Field name

Type

Use

cduID

Integer

Unique identifier for the CDU

bayNum

Integer

Number of the parking bay in which the CDU is located

bayLocation

String

Street address of the parking bay

cduBattery

Boolean

Is the CDU's battery getting low?

deadlineTime

Integer or floating point

The time by which the car must have left the parking bay (24-hour time)

The deadlineTime data type is awkward. The most efficient type would have been 'time' but that was not allowed. Storing it like "1345" meaning 1:45pm is also clumsy and requires processor-intensive parsing. It would be far better to store it as a number of seconds since midnight, which comfortably fits in a short integer.

4 marks

State average was 74%

Only responses from the provided list were accepted. The VCE Software Development Study Design states the following data types: integer, floating point, Boolean, character and string. It is important that students undertaking IT Applications and Software Development are aware of the differences in each study's definition of data types.

 

Question 6

The updateCduFile algorithm uses a function called bayNumFind. It will search cduFile for the bay number that matches the given cduID.

a.    Kirsten plans to use a binary search in the function bayNumFind.
What does this tell us about how the data must be organised in cduFile?

cduID has to be sorted from smallest to largest.

2 marks

State average was 28%

Most students were able to identify that the file needed to be sorted in order to perform a binary search; however, many failed to identify the data item that should be sorted – cduID.

b.   Kirsten can choose to have cduFile either as a serial file or a random file. Which should she choose and why?

Choice - Random file.

Reason - Records in a random file can be retrieved far more quickly than those in a serial file because the starting byte of any record can be calculated with a simple calculation because every record has the same length. Serial files do not have to have their field lengths pre-defined, so their contents can be far more flexible than a random file, but one has to seek from the start of the file through each record until the required one is found.

2 marks

State average was 40%

Only a small number of students were able to adequately give a reason why a random file was better than a serial file in this instance. Random access files allow direct access to required records/data, so every record does not need to be read to find it as is the case with a serial file.

 

Question 7

For the process 'Determine overstay bays' Kirsten has developed the following algorithm. It goes through every record in cduFile and finds any that have overstayed. There is one record per parking bay.

Normally currentTime is set by the system, but for testing purposes Kirsten will set it to 1300 (1.00pm). To properly test the algorithm, Kirsten believes she will need to have four different values for deadlineTime. Complete the table below with samples that test the algorithm. State which line is being tested.

DeadlineTime Expected outcome Line of code Reason
1259 send overstay message if currenttime>deadlinetime Time has elapsed
1300 none if currenttime>deadlinetime Time is on the borderline, but not over
1301 none if currenttime>deadlinetime Time has not elapsed
-1 none if deadlinetime <>-1 then No car is in the bay

8 marks

State average was 41%

In this question students needed to identify key boundary conditions that would test the algorithm logic. Many students confused the variables deadlineTime with currentTime. An overstay message should occur if the deadline time was prior to 1300 (1.00 pm).

Students should be given the opportunity to demonstrate these skills in testing tables throughout the year. Creating their own test tables for assessment is not sufficient; sample algorithms with and without errors and practice questions from past papers should be completed where appropriate to ensure students are well prepared for these types of questions.

Kirsten now works on the mobile phone software. This software will be responsible for the three use cases associated with the parking officers.

 

 

Question 8

Messages containing overstay parking data are sent from the dedicated council computer to the mobile phone of the parking officer in the area. The phone software must process the messages in the order they are received.
Which data structure, stack or queue, should Kirsten use to store the messages? Justify your choice.

Choice - Queue

Justification - A queue stores incoming data and releases it in the order in which it arrived. A stack (usually) releases that last datum that arrived most recently, which is not the desired behaviour in this case.

4 marks

State average was 59%

The majority of students were able to identify queue as the correct data structure. It was clear that students had covered this material well as they were able to articulate the fundamental difference between queues and stacks, that being the order is which data is handled – first in first out (FIFO) for queues versus last in first out (LIFO) for stacks. In this case the tickets needed to be processed as they were received, so a queue was required.

The following is an example of a high-scoring response.
Choice: A queue structure should be chosen by Kristen
Justification: Kristen should choose a queue structure because it operates in a FIFO (first in first out) nature. Therefore the first message which will be sent to the officers mobile will be the first which is processed and dealt with which enable officers to deal with the infringements in the order in which they occur, as opposed to always having the first infringement processed last (like the operation of the stack) as offenders could never be punished as they are gone by the time the officer makes it on site.

 

Question 9

When the parking officers arrive at the parking bays they will enter the car's number plate into their mobile phones. The software must check that each number plate entered is in the correct format. Then each number plate is sent to the dedicated computer. Kirsten has proposed the following algorithm. The number plates can only contain numbers and letters and be no longer than 6 characters. The function length() is used to find the number of characters in a string.

I love the image of parking officers removing number plates from cars and entering them into their mobile phones.
Perhaps the examiners meant to say the officers entered the car's registration number?


A.    Kirsten desk checks this algorithm with test data for the numberPlate, as shown below. Complete the test table.

Test

Test data

Expected outcome

Actual outcome

1

ABC123

none

invalid number plate*

2

*ABC

invalid number plate

invalid number plate

3

123AB&

invalid number plate

invalid number plate*

*Thanks to Melanie for pointing out that because the test data is 6 characters long (not < 6), it fails the first IF test and drops down to the second numberPlateValid = False line without even checking for invalid characters. I'm not sure the examiners intended this. Were they, I wonder, if thinking that the actual outcomes were (1) valid, (2) invalid, (3) erroneously valid as I originally did?

4 marks

State average was only 18%  !!

When completing a testing table, students should ensure that the expected outcome and actual outcome are based directly on the algorithm in the case study. Many students wrote words such as 'true' or 'invalid', which showed understanding but did not reflect the messages displayed by the algorithm.

b.   Describe the error that this test data shows.

It automatically rejects number plates that are 6 characters long and does not even check them for valid characters.

1 mark

State average was 40%

The algorithm had one error based on the testing table: it does not check the length of the number plate correctly. A number of students responded with 'logical error'; however, the question required a description of the error shown by the test data.

c.    Write down the line of the algorithm that has caused this error.

If length(numberplate)>0 and length(numberplate)<6 then

1 mark

State average was 50%

The line of the algorithm that has caused the error was:

If length(numberPlate) >0 And length(numberPlate)<6 Then

This question asked students to write the line of the algorithm with the error. Students are encouraged to write the whole line of the algorithm, rather than parts of the line or creating line numbers for the algorithm.

d.    Write down the line as it should have been written.

If length(numberplate)>0 and length(numberplate)<=6 then

or

If length(numberplate)>0 and length(numberplate)<7 then

1 mark

State average was 45%

The majority of students found this question challenging. Algorithms and testing are both covered in two of the four Areas of Study and students need to develop their understanding of each. Students should practise these types of questions either in classroom activities using past examination papers or in assessment where appropriate.

 

Question 10

Kirsten is concerned about the storing of offenders' details if parking officers lost or even left their mobile phones on their desks at work.

State two features Kirsten should build into the mobile phone software to ensure that the data in the parking officers' mobile phones is secure.

For each feature, explain how it would help secure the data.

Feature 1 - password-protected login

Explanation - prevents unauthorised people using the software

Feature 2 - encryption of stored and transmitted data

Explanation - prevents unauthorised people 'sniffing' data travelling wirelessly. Also prevents people being able to read data stolen from the device's storage.

4 marks

State average was 69%

Students' familiarity with mobile phones was in some cases a limitation to them providing accurate responses to this question. A number of students simply described a list of mobile phone safeguards – for example, a timed screen lock– rather than what should be built into the software to ensure the security of the data.

The following is an example of a high-scoring response.
Feature 1: Password authentication
Explanation: This would only enable the authorised people to access the data who knew the password. Therefore, the data could not be easily stolen.
Feature 2: Encryption
Explanation: Even if the phone was compromised the data would be unreadable to everyone except the person or people it is intended for eg by using public/private key authentication. This means that the data even if it is removed from the phones can't be accesses by unauthorised people. Therefore, only the council and parking inspectors need to be able to decrypt this data.

 

Question 11


A friend, Jose, argues with Kirsten that if she uses single letters for variable and procedure names, her program code would be 20% smaller and hence she would be producing more efficient software.

A.    Explain why Kirsten should ignore this advice.

The names would be meaningless and would require constantly referring to a data dictionary to find out what the variables and procedures contained or did. It could also easily lead to errors by using the wrong variables.

2 marks

State average was 50%

Students needed to demonstrate an understanding of efficiency in their explanation. According to the study design glossary 'measures of an efficient solution include the speed of processing, the functionality of the solution, the ease of use of the solution …' Full marks were awarded to responses that focused on processing and ease of use.

The following is an example of a high-scoring response.
It is the processing of lines rather than reading variable and procedure names that take up processing time, so any efficiency gains would be too small to be measurable. Furthermore, single letter variables and procedure names make code hard to understand making development and maintenance more difficult.

b.   State one other action, besides using meaningful names, Kirsten could perform to make her program code more programmer friendly.

Lots of useful, relevant internal documentation.

The following is an example of a high-scoring response.
Kristen should include meaningful internal documentation.

1 mark

State average was 75%

Most students were able to show that a naming convention and internal documentation were essential elements for the maintainability of the code by the programmer or a future programmer, and that variable length had little, if any, impact on the efficiency of the software.

 

Question 12

During the development of the software, Kirsten finds a module developed by the Fast Fines company. If she could use this module she would not have to develop the module herself.

Explain Kirsten's legal obligations if she wishes to use this module.

The Copyright Act (1968) says she would need to obtain permission from the owner of the intellectual property before using the code.

2 marks

State average was 65%

Some students failed to provide a detailed response to this question. Students should ensure that they read questions carefully and provide sufficient depth and detail in their responses to ensure the question is answered as asked. To gain full marks students needed to make reference to the legal obligation, namely intellectual property through copyright, and an action that could be taken in order to act legally such as seeking permission or paying a fee for copyright permission.

The following is an example of a high-scoring response.
As the module was created by the Fast Fines Company, it is legally protected by the Copyright Act. If she wishes to use the code she would have to contact the company and ask their permission, as well as most likely pay a cost to be able to use it.

 

Question 13

Kirsten is sure that all of the errors are now out of the software and that it is ready to be used by the Bigton City Council. The final testing process is to complete the User Acceptance Testing (UAT), but James is not entirely sure what this is and how he will be involved.

a.    Explain the process of UAT and how James and the other staff will be involved.

UAT is testing the opinions of people who will actually use the software once it is released. This is important because these people will have to use it, and can offer valuable feedback from a experienced user's point of view. It is not done by developers, who are too close to the system and may not see its faults, or managers who would be unlikely to know what is important from a regular user's perspective.

3 marks

State average was 47%

Most students struggled to provide a detailed response, limiting their responses to statements about 'checking the system does what is intended'. In addition, many students confused user acceptance testing (UAT) with evaluation.
User acceptance testing occurs in the development stage during testing activities, generally as the last testing step before implementation and user sign-off that the programming solution meets the requirements in the software Requirements Specifications (SRS). The UAT would then be evaluated for its effectiveness as part of an evaluation strategy.

For full marks students needed to address what is involved in user acceptance testing, James' role in this and how other staff would be involved.

The following are examples of high-scoring responses.
The user acceptance testing is done at the end of development and requires the Bigton City Council staff such as James to test the solution to make sure it operates in the intended manner. They will use numerous tests such as accuracy tests, response rate tests to make sure that it operates correctly before signing off on the solution.

A UAT is the process of finding out if the software meets the requirements and the expectations of the end user. The parking staff will be involved in testing the mobile software and each of the other staff members will test if their section functions correctly. Once testing is completed the staff will report back to Kirsten any problems.

b.   Provide an example of a criterion that the new PIMS must meet to pass the UAT process.

It must be easy for the parking officers to use.
It must be reliable and responsive.
Its output (onscreen and printed) must be clearly readable.

1 mark

State average was 45%

A variety of responses, including their form, were appropriate to this question. For example, some responses stated a criterion in terms of a question; others identified if the criterion was a measure of efficiency or effectiveness and then provided an example.
The following are examples of appropriate responses.
The PIMS must be able to send overstay data to the mobile phones of parking inspectors.
Effectiveness – more overdue cars are being found and more fines are being issued.
Does the system send the location of overstayed cars to a parking officer's mobile phone?

 

Question 14

To evaluate the success of the PIMS, Kirsten needs to collect a range of data.
Suggest a strategy that she might use to acquire data relating to the accuracy of the parking fines that are issued.

  • She could check council logs to count how many complaints there have been by motorists about incorrect fines being issued.
  • She could also investigate court records to find how many times motorists successfully challenged incorrect fines.
  • She could advertise for people to give feedback on the accuracy of parking tickets they have received.
  • She could interview parking officers about how often the system has indicated a fine should be given when the officer knew a fine was not actually deserved.

She would not get a car to enter/leave a bay and leave it there for various times, and observe whether tickets were issued by the system - this would be testing, not evaluation.

3 marks

State average was 33%

This question required students to suggest a strategy to evaluate the accuracy of the parking fine issued. A number of students missed the key word 'accuracy' and provided a general answer. As in previous years many students found it difficult to develop a strategy. A strategy is a method by which an activity is carried out; this would include a set of steps or procedures, i.e. What will be done? When does it happen? Who does it? etc. Evaluation questions can be found on previous exams and these questions should be used as appropriate in classwork and in assessments.

For full marks responses needed to consider what data needed to be collected, who was collecting it and from where, and what type of information was being generated to measure the accuracy of the solution.

The following are examples of high-scoring responses.
After approximately 6 months, Kirsten should attempt to collect data as to the accuracy of parking fines produced. To do this Kirsten should consult documents, or logs, letters, emails, telephone correspondence (possibly notes taken by the council when on the phone to clients). All of this information will show how many complaints there have been from customers over the last 6 months to determine how well Kirsten's solution is working. She could also survey customers to see if they notice improvements or agree with the accuracy of the fines. This could be done through the post or email or online survey.

Kirsten may wish to count the number of complaints from motorists in relation to being overcharged in their parking fines. If this number is lower than the previous system then it is an indicator of success although it should be noted that more parking fines are likely to be issued with the new system increasing error amounts.
Kirsten should review any documents relating to the public's complaints with regards to the fines that were issued. She could
survey affected people as to whether the parking fine was accurate when they came to pay their fine, bearing in mind that some people will lie about whether they deserve parking fines. She should also interview some parking officers as the whether they have noticed inaccuracies in the new system

 

Question 15


The key users of the new PIMS developed by Kirsten are the parking officers. The Council wants Kirsten to develop a training program to teach them how to use the new software.

A.    Describe a suitable training program she could use.

The case study does not say how many officers need training. If there are not too many (e.g. a dozen or fewer), they could be trained in a single group with practical hands-on experience.
If there are many of them, a group lecture could introduce the system to them all, and selected officers could be trained as trainers to teach the rest.
If they were all trained at the same time, it would need to happen outside of normal work hours so people don't get away with illegal parking.

2 marks

State average was 65%

Most students were able to provide a reasonable response to this question. Student generally responded with, 'train the trainer' or 'onsite group training'; however, a range of responses were appropriate as long as they were applicable to the
organisation.

b.   Suggest how the Council could measure the suitability of this program.

They could test trained officers in the use of the system and see how many mistakes the officers made. If trained offers used the system accurately and quickly, the training would be considered a success.

1 mark

State average was 40%

Suitable responses included a method of data collection (for example, a survey, interviewing, a written test or observing) and what was to be collected (for example, questions such as was the training sufficient or who was the data to be collected from – the parking inspector) or when this would occur (for example, at the conclusion of the training program). Many students misread the question and assumed the word 'program' was the software implemented, not the training
program discussed in 15a.

 

Question 16

The introduction of the new PIMS at the Bigton City Council will affect a number of stakeholders. Outline the conflict that may occur between the Council and each of the following stakeholders.

Parking officers

If fewer parking officers are needed with the new system, some of them might lose their jobs. This would cause a considerable amount of stress and hardship.

Some officers might resent having to learn a new system - especially some older experienced people who have used the old system for years.

Motorists using parking bays

Motorists might believe they are being watched by a 'Big Brother' and resent the intrusion.
They might not believe or trust the evidence of the the sensors and the ticketing system, and might want to challenge its accuracy.

They might resent having their rates used to pay for a system that will fine them more efficiently!

They might be annoyed that the new system is fining them for offences they never got caught for in the past (e.g. overstaying for a short period of time).

2 marks

State average was 30%

Most students found this question challenging, with many unable to clearly describe a conflict. An answer such as 'they may feel annoyed' was not sufficient. The following is an example of high-scoring response.

Parking officers: The parking officers may resist the council's changes and be angry about the new system since they weren't warned or told why. This could result in for example, strike action or an increase in sick days. Motorists will complain that the council is deliberately attempting to raise revenue from PIMS and that the software is unfair/unjust.

 

END OF QUESTION AND ANSWER BOOK

   

 

Back to the IT Lecture Notes index

Back to the last page you visited

Created 17 November 2011

Last changed: November 19, 2014 1:34 PM

Original Content © Mark Kelly 2010
Images and questions are © Victorian Curriculum and Assessment Authority 2010.
Reproduced here with permission for educational purposes.

VCE IT Lecture notes © Mark Kelly