information processes and technology...2016 higher school certificate trial examination information...
TRANSCRIPT
2016 HIGHER SCHOOL CERTIFICATE
TRIAL EXAMINATION
Information Processes and Technology
General Instructions
• Reading time - 5 minutes
• Working time - 3 hours
• Write using black pen
• Draw diagrams using pencil
• Write your student number and/or name at the top of every page
Section I Total marks (20) • Attempt questions 1-20 • Allow 40 minutes for this section • Mark your answers on the answer sheet provided
Section II Total marks (40) • Attempt questions 21-24 • Allow 1 hour and 10 minutes for this section • Answer in the spaces provided on this paper
Section III Total marks ( 40) • Attempt TWO questions from Questions 25-27 • Allow 1 hour and 10 minutes for this section • Answer each question on a separate piece of
paper
STUDENT NUMBER/NAME: ______ _
Information Processes and Technology 2016 Tn"al Exam Student Number/Name: ............................................ .
THIS WAS A BLANK PAGE
Page2of28
Information Processes and Technology 2016 Trial Exam
Section I
Total marks (20) Attempt Questions 1 - 20 Allow 40 minutes for this section
Use the multiple choice answer sheet
Student Number/Name: ............................................ .
Select the alternative A, B, C or D that best answers the question
l. Which document considers whether the participants have the technical skills to implement a possible solution to a problem?
(A) Project Plan
(B) Requirements Report
(C) Implementation Plan
(D) Feasibility Study
2. It is determined that a new system will be developed and implemented to replace the current call-out system for the volunteer fire brigade in a small country town. What is the recommended method of implementation for such a critical system?
(A) Direct
(B) Parallel
(C) Phased
(D) Pilot
3. Data validation aims to ensure data is reasonable as it is entered. Which of the following is NOT an example of data validation?
(A) Selecting the entered item from a list.
(B) Ensuring that the entered data lies within a stated range.
( C) Checking that the data entered is current and up to date.
(D) Checking that the entered data is of the correct data type.
4. Which of the following is an example of error correction?
(A) Syncluonising the exchange of data between two devices.
(B) Addressing and routing packets through a network.
(C) Encryption and decryption of data to ensure security during transmission.
(D) Resending packets that have not been acknowledged.
Page 3 of28
Information Processes and Technology 2016 Trial Exam Student Number/Nan1e: ............................................ .
Refer to the following online form when answering questions 5, 6, 7 and 8.
Property Details
Property JD j 76582435
Property Type jAiiilrtment :::J Property Number j 11 /8
Address j Cecil Street
Suburb I Ashfield
Post Code 12131
Parking 17 Asking Price rl $-9-00-,-000--
5. Which of the following lists appropriate data types for the Suburb, Post Code, Parking and Asking Price fields respectively?
(A) Text, Number, Boolean, Number (B) Text, Text, Boolean, Cunency (C) Text, Boolean, Number, Number (D) Text, Boolean, Boolean, CUTI"ency
6. The Property ID field uniquely identifies the listed property. What te1m is given to this type of field in a database?
(A) Numerical key (B) Primary key
( C) Secondary key (D) Foreign key
7. There are a number of property types stored in the Property Types table. What is the relationship between records in the Property Details table and records in the Property Types table?
(A) one to many
(B) many to one ( C) one to one (D) many to many
8. Each record includes an image of resolution less than 640 by 490 pixels. In terms of record storage size, which of the following is true?
(A) The image requires approximately the same storage as all the other fields combined.
(B) The image requires less storage than all the other fields combined. (C) The image requires slightly more storage than all the other fields combined.
(D) The image requires significantly more storage than all the other fields combined.
Page4 o/28
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Refer to the following diagram when answering questions 9, 10, 11 and 12.
t_name t_office
temp code new date
9. What is this name given to this design tool?
(A) Dataflow diagram
(B) Decision table
(C) Schema
(D) Storyboard
assess_oo mark
max_ mark weight
10. In terms of tutors, Tutorials and Students, which of the following statements is correct?
(A) A student is enrolled in one tutorial but tutors can run multiple tutorials.
(B) A student is enrolled in one tutorial and tutors run a single tutorial.
(C) A student can be enrolled in multiple tutorial and tutors can run multiple tutorials.
(D) A student can be enrolled in one tutorial but tutors can only run a single tutorial.
11. The following SQL query is executed on the above database:
SELECT Student.stud_surname, Student.stud_givenname FROM Tutorial INNER JOIN Student ON Tutorial.tute_no =Student. tute_no WHERE Tutorial.tutor_no = 52 ORDER BY Student.stud_surname ASC;
What would be the results of this query?
(A) An alphabetical list of student surnames and given names in tutorial number 52.
(B) An alphabetical list of all the tutorials where Student number 52 is enrolled.
(C) An alphabetical list of student surnames and given names whose tutor is number 52.
(D) An alphabetical list of student surnames and given names.
12. With regard to the Students, result and assessment tables, which of the following is true?
(A) Total number of result records is less than or equal to the total number Student and assessment records combined.
(B) There will always be more result records than in either of the other tables.
(C) Total number of result records is less than or equal to the product of the total number Student of records and total number of assessment records.
(D) Each student can have many result records corresponding to a single assessment record.
Page 5 o/28
Information Processes and Technology 2016 Trial Exam
13. Which is a transmission level protocol?
(A) smtp
(B) TCP/IP
(C) http
(D) Ethernet
Student Number/Name: ............................................ .
14. Which of the following best describes the checksum method of error detection?
(A) Checksum performs a division calculation on the entire block of data to produce a 16 bit or 32 bit result.
(B) Checksum adds together the values of all the bytes transmitted in a message block and sends the total as the last data byte of the block.
(C) Checksum adds an extra bit to every character transmitted depending on the method agreed by the sending and transmitting devices.
(D) The transmitting device sends each block of data twice and the receiving device compares the two to determine if errors have occurred.
15. What is a blog?
(A) A chronological log of posts on the web. Often blogs are written by a single author and/or concentrate on a single subject.
(B) A website that provides collaboratively created and verified information. Users both contribute to and read information on a blog.
(C) A series of audio or video episodes that are broadcast. Subscribers to the broadcast stream each episode to their device.
(D) A website where users share their experiences online via posts. A sequence of posts about a particular topic is known as a thread.
16. Copies of many government documents are available to the public as a consequence of which laws?
(A) Copyright Laws
(B) FOILaws
(C) Privacy Laws
(D) Civil Laws
17. Which of the following provides timely, statistical evidence to decision makers directly through the use of visual online tools?
(A) OLAP
(B) OLTP
(C) Data mining
(D) Data warehousing
Page 6 of28
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
18. With regard to IP (Internet Protocol) and error detection and correction of data, which of the following is true?
(A) No error detection or correction.
(B) Parity checks are used. (C) Checksums are used.
(D) Cyclic redundancy checks are used.
19. All nodes on a LAN connect to a central device and all nodes share a single transmission channel. The central device could be which of the following? (A) bridge
(B) router (C) switch
(D) hub
20. Which of the following errors are ALWAYS detected by parity bit checks? (A) Reversal of an even number of data bits.
(B) Reversal of an odd number of data bits. (C) Reversal of all data bits. (D) Reversal of a single data bit and the parity bit.
Page 7 o/28
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
THIS WAS A BLANK PAGE
Page8 o/28
Infornzation Processes and Technology 2016 Trial Exa1n Student Number/Name: ............................................ .
Section II
Total marks (40) Attempt Questions 21- 24 Allow about 1 hour and 10 minutes for this section
Answer in the spaces provided on this paper.
If you include diagrams in your answer, ensure that they are clearly labelled.
Question 21. (6 marks) Marks
(a) What is twisted pair cable and why is it so popular compared to other types of cabling? 2
(b) Describe the major functionality performed by a network interface card (NIC). 2
( c) Describe the major functionality performed by an ADSL modem. 2
End of Question 21
Page 9of28
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Question 22. (13 marks)
Refer to the following information when answering all parts of Question 22.
A public hospital has a large networked computerised information system containing confidential information about patients, their illnesses and treatments. There are three types of users, namely medical staff, administrative staff and patients Each are allocated different levels of data access.
(a) Discuss the data that would be accessible (and inaccessible) to each of the three types of user.
(b) Explain ways in which the security of the network can be ensured.
Question 22 continues on the next page
Page 10of28
Marks
3
3
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Question 22 (continued)
( c) Explain the imp01iance of data backups in this system and recommend a data backup and recovery strategy.
( d) Outline ways in which the network manager could reduce the risk of sensitive patient information being viewed by users who are not authorised or for whom it is inappropriate.
End of Question 22
Page 11 o/28
Marks
4
3
Infonnation Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Question 23. (13 marks)
Refer to the following information when answering all parts of Question 23.
A local garden centre has several buildings spread over a sizeable garden area. The management has decided to update the existing information system, including the network, the existing computers and adding several information kiosks.
The kiosks will be strategically located throughout the garden for customers to locate plants and obtain information about them. As part of the information system upgrade management are considering whether to install a wireless network or a wired network.
A feasibility study will be carried out to advise management, then after careful consideration the management will decide how to proceed.
(a) Identify and explain matters of feasibility that should be examined during the feasibility study.
(b) Explain advantages and disadvantages of installing a wireless network for this situation.
Question 23 continues on the next page
Page 12 of28
Marks
4
3
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Question 23 (continued) Marks
( c) Recommend and justify a suitable method of implementing the new system for the garden centre.
( d) Security of information is a concern, especially with regard to EFTPOS and credit card payments. Identify methods of securing sensitive data when making online payments.
End of Question 23
Page 13 of28
3
3
Information Processes and Technology 2016 Trial Exanz Student Nunzber/Name: ............................................ .
Question 24. (8 marks)
The following DFD (dataflow diagram) describes a typical quoting and job completion system for a typical business whose workers supply some type of service to customers.
(a) Based on the DFD, explain the processes occurring to quote and complete a job.
Question 24 continues on the next page
Page 14 o/28
Marks
3
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Question 24 (continued)
(b) Based on the DFD, construct a context diagram.
(c) Based on the DFD, explain the likely similarities and differences between "Quote details" and "Job details".
End of Question 24.
Page 15 o/28
Marks
2
3
Information Processes and Technology 2016 Trial Exam Student Number/Name: .......................................... : ..
THIS WAS A BLANK PAGE
Page 16 o/28
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Section III
Total marks (40) Attempt TWO questions from Questions 25 - 27 Allow about 1 hour and 10 minutes for this section
Answer each question on your own paper or writing booklet, if available.
Start each question on a new page.
If you include diagrams in your answer, ensure that they are clearly labelled.
Question 25 - Transaction Processing Systems. (20 marks)
Start a new page.
(a) (i) Describe what is meant by batch processing
(ii) Describe what is meant by offsite storage and its significance to the backup and recovery process
Question 25 continues on the next page
Page 17 of28
Marks
2
2
Infonnation Processes and Technology 2016 Trial Exan2 Student Nun1ber/Name: ............................................ .
Question 25 (continued)
Use the following information to answer parts (b) and (c) on the next page.
www.Tablem.com is a web-based application that can be used by those hosting a large function, allowing them to allocate fixed seating to invited guests attending the function.
When first defming the function, the date and name for the function is entered through the website. The guest details can then be subsequently entered and/or edited through the keyboard, or imported from an existing CSV file which contains the guests' surname, firstname, gender and other relevant details.
1. Start by creating a new event.
«'h •: "il •n . -- . . -..
2. Add guests: lf you already have a list of the guests, you can simply copy and paste it or upload it via an Excel worksheet.
'Ncwgtwl
It is then necessary to define the number and orientation/shape of the required tables (as defined by the function centre), with the number of seats required on each table.
Once the guest details have been entered and the table layouts defmed, it is then possible to drag and drop the saved guest names to each of the seats so that guests can be seated appropriately.
3. Add tables: You can change the table size, rotate tables, and add or remove seats.
r~ 11= ~.
n-·- . n·-,n·-~ n .... ·~ fl....... 00
R::: I - I n--n~·r;;-r:;·--
5. Fine tune your plan. You can drag and drop people directly into and out of seats. Save the plan and reedit if changes ta your guest list occur.
1.
Question 25 continues on the next page
Page 18 o/28
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Question 25 (continued)
(b) (i) Describe the technology requirements for this system to function as described.
Marks
3
(ii) Explain how the seating plan data, including tables, seats and people, would 3 likely be stored by this system.
(iii) Describe the advantages to be gained through the use of this system, compared 3 to any previous manual system.
( c) As well as allowing a visual seating allocation plan, there are a variety of reports that can be produced.
These include
1. A list for each table to be placed on the table with the names of all guests seated at that table.
2. A full list of guests in alphabetical order together with their table number, to be enlarged and placed at the entrance to the function venue.
3. A full list of each table in table order and the guests at that table, so incoming guests can see with whom they are seated.
4. A set of place cards to be put at each place on the table containing the name of the guest seated at that place.
5. A list for the caterers, with all of the special meals sorted by dietary restriction type so the catering staff can quickly see how many meals of each special type need to be prepared, and to which table they are to be delivered.
(i) Design the report layout for the report
3. A full list of each table in table order and the guests at that table
Clearly show the separate parts of the report and the detail included
(ii) Design a DFD that models this complete system.
End of Question 25
Page 19 of28
3
4
Information Processes and Technology 2016 Trial Exam Student Nu1nber/Name: ............................................ .
THIS WAS A BLANK PAGE
Page20of28
Infonnation Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Question 26 - Decision Support Systems. (20 marks) Marks
Start a new page.
(a) (i) Describe what is meant by the process of"drilling down" in an OLAP system. 2
(ii) What is a Management Information System (MIS) and provide a relevant 2 example.
Question 26 continues on the next page
Page 21 o/28
Information Processes and Technology 2016 Trial Exam Student Number/N"ame: ............................................ .
Question 26 (continued)
Use the following information to answer parts (b), (c) and (d) on the next page.
School are increasingly being asked to move from marks-based reporting to outcome-based reporting for each assessment task. This requires that for each task, each question part is related to a specific course outcome. The results of each task can then be reported according to achievement of each outcome rather than simply a total mark. The spreadsheet solution below aims to assist teachers to produce such results.
' >; o; o;
' o' • ' ' ' >; " o; n ,. o:1n1rohtru<1ur6 u '
,, " JVSIOnud~mtnmlon u o; lG a>mpilorlcn " •: lsystem•docu.,..nUriot1 u ' <a>pcofwri>bl<• " ' o'
<lebuulnr " o; .3Q..i""l'rcu"i"$ " ' " ro• " o;
" •' 21(•) ' ,,
21lb) ,, 21{<) o; 21(~) ' •; 22[•)Fl
" <UU!rnet\l....,,,>X 22!•)fill •' " Ui.ol' 22(o)lm) •jlllllllll 4:
~::~ 23(>1 o'.
24iii(bl ' ,,
loniinrngordtt 26(•)(i) o; "'°"v,11~• cflons lntcie< 26(1)(11) blMryccnversfon 26(•)(1[•]
,, ~bin>ry>dditlon- 26(>)(iv) •'
DfDfo:~""IYll"•n 26(b)(1) '°ii< •?<Olld<>CO<!O 26(b)(iiJ >;
" ifuWyroutino 26(b)(iii)(;)
" lo,!icforlibr.iryrottdM 26(b)(ia)(ITJ ,,
" ,, •' ,, ,,
>OO' « w' n' "' u' ,, "
" •••fr;11:tk>n: " '·' '·' " •.. " I -· --~·--- -- ·-*1- >$3pen;Mf>JIO:
.. ·-:u; - . 64- -"
- -19-- - -5,
*1 augrodc ' ' ::ill
The spreadsheet is composed of five main areas.
1. Data for this specific assessment task. Columns A - J down to row 52 in this example, with the exception of column D. It includes the maximum mark for each question part (column C) and identifies the outcome addressed by that part (columns F-J).
2. Entry of student marks achieved in each question. Column D.
3. Assigning student marks to outcomes. Columns K - 0 down to row 52 in this example.
4. Final mark totals are in row 55 in this example.
5. Grade calculation area to convert the mark in each outcome to its corresponding A-E grade.
Question 26 continues on the next page
Page 22 of28
Infomiation Processes and Technology 2016 Trial Exani Student Number/Nanie: ........................................... ..
Question 26 (continued)
(b) First the spreadsheet is prepared for a specific assessment task.
(i) The outcomes entered in cells F2 to J2 need to be duplicated into cells K2 to 02. What is the most efficient way of performing this duplication?
(ii) The amount each question part is "out of' is entered in Column C and this same "out of' value is entered below the relevant outcome in Columns F-J. Describe how the developer could ensure that these "out of' marks are reasonable when entered.
( c) A separate worksheet is now created for each student.
Marks
2
2
(i) The marks for each student are entered and reflected under the appropriate outcome in columns K-0. Describe the formula in cell K3 which was filled 3 across and down to 052 to produce the required results.
(ii) What is the purpose of the red message in cell E29, and how is it produced 2 and formatted?
(iii) Describe how the letter grades in cells K61 :061 can be produced automatically.
(d) Analyse the effectiveness ofthis automated DSS spreadsheet system, compared to the alternative manual approach of subjectively determining grades for each outcome based on the teacher's understanding of the student's potential.
End of Question 26
Page 23 o/28
3
4
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
THIS WAS A BLANK PAGE
Page 24 o/28
Information Processes and Technology 2016 Trial Exam
Question 27- Multimedia Systems. (20 marks)
Start a new page.
Student Number/Name: ............................................ .
(a) (i) Outline the difference between primary and secondary data storage.
(ii) Define sample size and sample rate with regard to digitising audio files.
Question 27 continues on the next page
Page 25 o/28
Marks
2
3
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
Question 27 (continued)
Use the following information to answer parts (b) and ( c) on the next page.
www.justinguitar.com is a website created by Justin Sandercoe and devoted to helping people learn to play the guitar. Currently it hosts nearly 1000 free lessons ranging from beginner level to advanced. Lessons are in the form of videos, text and diagrams. There are many audio recordings of songs and music and also a timer and metronome available on the site. The website also hosts an active forum and streams live shows from Justin, his band and guests.
Some screen shots from the site are shown below.
~ f•a& 'A" Donate ~Timer & Metronome q -
Welcome to justinguitar.com • over 980 completely free guitar lessons!
The best guitar lessons i!IVl:lil;:ible on the Internet- and they're free:) Nothing to pay, nothing to lose · so take a look around and see why over 30,000 people a day le~,m 9U,l_tar ,,h,ere!
There are hundreds of free gulti!lr lessons here and It's taken a lot of work over nearly 15 years for me to create it all, It's important to me to help everyone that wants to learn to play the guitar, not just those with money for t\Jlt!on, so I run it on an "honour system" and I rely on the honesty of users like your good self to make n donntion If they can
Look <it the chord box for the D chord below. The black dots are the
D x x 0
1' ~ 2' b 3 •
it'- -w.justinguitar.com
www.justinguitar.com Used with permission
Page26 o/28
Information Processes and Technology 2016 Trial Exam Student Number/Nanze: ............................................ .
Question 27 (continued)
(b) The image below of the hand on the guitar is 160 pixels by 160 pixels and is true colour with a bit depth of 24.
(i) Calculate the memory used when viewing the bitmap image shown on screen.
(ii) Explain the effect on the file size and the image of quadrupling the number of pixels in each direction so it measures 640 by 640 pixels whilst reducing the colour depth to 8 bits.
Marks
2
2
(iii) The image is saved as a JPEG file. Describe the effect on file size compared 2 to the result obtained in part (i).
( c) (i) Justify this website as a multimedia system. 3
(ii) Evaluate the importance of interactivity when creating a website such as this 3 one.
(iii) Discuss the reasons why copyright is an important issue for the developer of a 3 website such as this one.
END OF EXAMINATION
Page 27 o/28
Information Processes and Technology 2016 Trial Exam Student Number/Name: ............................................ .
THISWASABLANKPAGE
Page 28 o/28
NSW Independent Trial Exam Information Processes and Technology HSC Trial Examination 2016
SUGGESTED ANSWERS AND MARKING CRITERIA
Section I - Mnltiple choice
1 2 3 4 5 6 7 8 9 10 D B c D B B B D c A 11 12 13 14 15 16 17 18 19 20 c c D B A B A A D B
Section II - Core
Question 21 (a)
Marking Criteria Marks
Provides a substantially correct definition for Twisted Pair Cable and at least one advantage 2
Provides an approximate definition for Twisted Pair Cable OR at least one advantage 1
Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each connection on twisted pair requires both wires. Since some telephone sets or desktop locations require multiple connections, twisted pair is sometimes installed in two or more pairs, all within a single cable. For some business locations, twisted pair is enclosed in a shield that functions as a ground. This is known as shielded twisted pair (STP). Ordinary wire to the home is unshielded twisted pair (UTP).
htto :// searchdatacenter. techtarget. co ml d efini ti on/twisted-pair
Question 21 (b)
Marking Criteria Marks
Provides a substantially correct description for the functionality of a NIC
Provides an approximate definition for a NIC
Network interface cards allow computers to connect to a network and to the Internet. Sometimes they are referred to as Ethernet cards or network adapters; these terms refer to the same component. Network interface cards are usually part of the motherboard, but they can also be installed as an expansion card. Modem network interface cards can co1U1ect to networks via cable with an RJ-45 connector or wireless via Wi-Fi.
https://www.reference.com/technology/network-interface-card-a1 Ocedf29ad73e71
The card contains the logic for the protocol used on the network, allowing messages to and from the computer to be successfully taken off I put onto the network, handling contention appropriately.
Question 21 (c)
2
1
Marking Criteria Marks
Provides a substantially correct description for the functionality of an ADSL modem 2
Provides an approximate definition for an ADSL modem 1
Page I of 19
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
The ADSL modem converts digital signals to and from the computer from or into a format that can be transmitted over high frequencies on a phone line connected to the local exchange and thence to the Internet (without interfering with current voice calls). It is asymmetric because the upload speed from the computer onto the Internet via the local switching centre is much slower than the download speed, as most commonly the user types in far less information than they receive from the Internet pages they are accessing. It is not necessary to dial a telephone number to initiate a connection; the DSL connection is 11on11
whenever the modern is on.
Question 22 (a)
Marking Criteria Marks
Provides a complete description of the data accessible or otherwise to all 3 groups of users
Provides a description of the data accessible or otherwise to at least 2 groups of users
Provides a limited description of the data accessible to at least 1 type of user
Medical Staff: need the highest level of access to all data, allowing them to read all of the data stored on patients, including patient personal details, diagnoses, medications, case comments.
3
2
1
They also need to be able to update the data associated with diagnoses, medications and case comments, and be able to add new consultation data. Doctors or nominated nursing staff should also be able to update the patient status (to indicate in surgery, in recovery, back on the ward, etc) as the patient is moved between the various locations in the hospital.
Administrative Staff: need to be able to see all patient personal details, such as first and surname, contact details, next of kin, bed number, associated doctor, and be able to update any of this information if it is incorrect or changes. They also need to be able to see the current patient status (in surgery, in recovery, back on the ward, etc) to allow answering of visitor queries.
However, they should have no access to diagnoses, medications, or case comments as it is not relevant to their job, and would raise privacy issues if they were allowed access and then misused the information.
Patients (and their nominated close family) : need to be able to log in to see the associated doctor's name, bed I ward details, and their current status (in surgery, in recovery, back on the ward, etc)
Question 22 (b)
Marking Criteria Marks
Demonstrates excellent understanding of network security and the ethical treatment of confidential information
Demonstrates understanding of network security AND/OR the ethical treatment of confidential information
Demonstrates some understanding of network security OR the ethical treatment of confidential information
Each authorised user should have a personal password which conforms to hospital defined rules, is changed regularly and kept private.
Passwords should be encrypted, and there should be a firewall appropriately configured to detect and manage unauthorised access to the network from external I unauthorised sources
All stored and transmitted data should be encrypted to prevent unauthorised use of the data.
Computers/devices used to access the network should not be lefr unattended when logged into the network, so users should ensure they always log out when they have finished their tasks.
Computers/devices should be defined with relevant access rights depending on their locations.
Page2of19
3
2
1
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
Staff using the network should be properly trained about security methods, with clear statements of accepted (and unacceptable) behaviours with respect to security of hospital I patient data.
The hospital should have a code of ethics regarding the correct use of confidential information with which all staff are required to be familiar.
Question 22 (c)
Marking Criteria Marks
Demonstrates excellent understanding of an appropriate method of backing up and restoring data on a hospital network
Demonstrates good understanding of methods of backing up and restoring data on a network
Demonstrates understanding of methods of backing up and restoring data on a network
Demonstrates some understanding of a method of backing up data
All data files should be backed up regularly. The backups should be performed on a scheduled timetable (daily/weekly). Backed up files should be encrypted and at least one copy stored off-site.
4
3
2
I
For this hospital system, a full backup of the system should be performed once a week and an incremental backup performed daily (to allow a copy of the data which has been changed since the last full backup to be saved). In addition, a transaction log of all transactions performed since the start of the day should be kept. It is critical that no data is lost if the system fails, and the time taken to create the incremental backup should not be too excessive or impact access to the system.
In case of data corruption, the most recently backed-up master file should be re-loaded and updated with all data changes made since the last back-up.
In other words, the data can be restored by loading the last full backup, followed by application of all incremental backups since the last full backup, and then applying each of the transactions from the current transaction log.
Question 22 ( d)
Marking Criteria Marks
Demonstrates excellent understanding of methods of methods of restricting user access to 3 sensitive information
Demonstrates understanding of methods of methods of restricting user access to sensitive 2 information
Demonstrates some understanding of a method of restricting user access to sensitive 1 information
The network manager should set up a system of user access rights. These are the permissions that are granted to a user, or to an application, to read, write, update or erase records in designated files used in the system. Access rights can be tied to a particular client or server, to folders within that machine or to specific programs and data files.
Passwords and data files should be encrypted. This means that anyone trying to access the data in the network will not be able to read or make use of the data without the encryption key.
The system should maintain a log of who is logging into the network and from which computer/devices, as well as the length of time users are logged on to a device, and raise an alarm if any unusual activity occurs. The system should also record the number of times someone enters an incorrect password and not allow them to log in for a set period of time after there has been (say) three incorrect attempts.
Question 23 (a)
Marking Criteria Marks
Identifies and clearly explains four factors of feasibility for the garden centre scenario 4
Identifies and clearly explains three factors of feasibility for the garden centre scenario 3
Identifies and explains at least two factors of feasibility for the garden centre scenario 2
Identifies a factor of feasibility 1
Page 3of19
!PT Trial HSC 2016 Suggested Answers and Marldng Criteria
Technical feasibility: considers all the necessary hardware and software for a relevant wireless network to determine if the technology exists and is readily available for purchase and customisation. This would include projected download speeds to the kiosks (particularly for media-rich displays)
Operational feasibility: Both types of network fulfil the centre's goals to provide better service for its customers, but the current skills of those both using and supporting this network would need to be considered. If training is necessary, it would need to be considered in terms of its availability and suitability. In addition, the design of the interface would need to offer significant ease ofuse to customers.
Economic feasibility: The cost of both types ofnetwork would need to be considered. The costs ofnot improving the system would result in less efficient service, possible loss of clients, greater staff costs (due to more time required to provide customer service). Costs of improving the system include the initial outlay, training of staff and installation and on-going support of the new technology. There would be additional costs involved with laying cabling to remote areas of the garden, and relandscaping if necessary. If the required funding is not readily available, consideration should be given to the possibility of a grant, donations or a loan to cover the projected costs for installation and support.
Schedule feasibility: Both types of network could be installed within a reasonable time frame although the wired network would take longer because of the need to install the cabling. Sufficient time should be given to fully testing the system once it is installed. Consideration should be given to client-defined deadlines such as a requirement for the proposed upgrade with its new kiosks to be ready in time for the summer, or ready for a particular flower exhibition, or in time for a public holiday, for example. If the required deadline is not able to be met, there will have to be discussions held with the garden centre management as to how this can be dealt with (such as by redefining the estimated date of installation, allocating more development staff, reducing the functionality of the proposed system to allow for a faster installation).
Question 23 (b)
Marking Criteria Marks
Clearly explains advantages AND disadvantages of using a wireless network in the garden 3 centre scenario
Clearly explains an advantage AND a disadvantage ofusing a wireless network in the garden 2 centre scenario
Identifies an advantage OR a disadvantage of a wireless network 1
Advantages of a wireless network:
Installation of wireless would be faster and less disruptive. There would be no need to dig channels and then to re-landscape, to allow laying of cables to remote kiosks.
Without cables, computers and kiosks could easily be moved to find the optimal configuration for the garden centre as customers' needs become more apparent
It is easier to add extra devices I kiosks to the network, as no new cabling is needed.
A business such as the garden centre having a wireless network that is accessible to customers can bring extra business. Customers generally love wireless networks because they are convenient and modem
Wireless networks can potentially handle a larger number of users because they are not limited by a specific number of connection ports. It is relatively easy to add extra access points as required.
Disadvantages of a wireless network:
Setting up a wireless network can sometimes be difficult for people who are not experienced with this technology. The garden centre may have to hire a specialist to install the wireless network to take into account 'dead spots' in the location.
File-sharing transfer speeds are normally slower with wireless networks than they are with cabled networks. The speeds can also vary considerably according to the location of the device in relation to the network.
The general speed of a wireless connection is also usually much slower than a wired one, and can have a significant impact, particularly ifthe data transmitted to the kiosks is media- rich (including video and voice). The connection also gets worse the farther you are from the router, which might be a problem with the size of the garden centre.
Page 4of19
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
Wireless connections can be obstructed by everyday items and structures such as (in this case) walls, plants and garden structures.
Wireless networks are generally less secure. The network would need to be set up to be password protected and encrypted.
Question 23 ( c)
Marking Criteria Marks
Identifies a relevant method of implementation AND clearly explains the advantages of this method for this scenario
Identifies a method of implementation AND explains an advantage of this method
Identifies a method of implementation
Students can recommend direct, parallel, phased or pilot implementation with advantages of their selected method for implementing this specific network.
3
2
I
For example: Direct implementation of the wireless network would be the best method, allowing it to be installed over a non-shopping weekend. It is the fastest method of implementation and the cheapest. In this situation the installation of the wireless routers would take little time. Networking software could be installed on the computers and kiosks and they could quickly be connected. All files should be backed up before implementation. Staff training required would be minimal and would relate mainly to the security of the network.
Alternatively, a Pilot implementation would involve the installation of one or two kiosks in significant locations in areas of high use, to allow the use and performance of the system to be looked at before installation of the total number of kiosks throughout the Garden Centre.
Question 23 ( d)
Marking Criteria Marks
Identifies at least 2 relevant methods associated with protecting secure payment data 3
Identifies a relevant method associated with protecting secure payment data 2
Identifies a method associated with protecting data I
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for sensitive data transmissions such as credit card payments. They use paired sets ofnumbers (known as keys) that include one public and one private key to be used, so that anyone intercepting the message does not also have access to the key to allow the effective decryption of the intercepted message.
HTTPS is a protocol for secure communication over a computer network which is widely used on the Internet. HTTPS provides authentication of the website and the associated web server with which it is communicating, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and the server, which protects against eavesdropping and tampering with or forging the contents of the communication.
Question 24 (a)
Marking Criteria Marks
Provides a complete explanation that demonstrates excellent understanding of the modelled 3 system
Provides an explanation that demonstrates good understanding of most of the modelled system 2
Provides an discussion that demonstrates some understanding of at least one part of the I modelled system
Page 5of19
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
1. a) The customer provides details for the proposed job, including information such as description, address, goods required etc, and personal details such as name and contact details
b) The customer personal information is stored in the Customers file
c) The quotation information (such as generated quote number, cost, duration etc) is stored in the Quotes file
d) A formal, professionally formatted quote is sent back to the customer (including quotation number, date generated, and all job and customer details)
2. a) the customer sends in their acceptance of the quote, using the customer number and quotation number
b) the quote number is used to retrieve the quote details from the Quotes file. At this stage, it is assumed that a relevant worker is allocated to this job, and the date for the job is confirmed (as part of the Schedule Job process)
c) The job details (including allocated worker, job description, date of service, customer number) are stored in the Jobs file
3. a) Each day, the job details for that day are retrieved using a query from the Jobs file. For each job, the relevant customer details are retrieved from the Customers file using the Customer number for that job.
b) The jobs data is sorted into Worker sequence (using the worker number allocated to the job), and a page is printed to be given to each allocated worker, listing details of each of the jobs allocated to them for today.
Question 24 (b)
Marking Criteria Marks
Provides a substantially correct context diagram for this system 2
Provides a recognisable context diagram for this system that has some errors or omissions I
Customer
Quote de1ails, acceptance
"-.._ robShee' Worker
Jobs System
Page 6of19
/PT Trial HSC 2016 Suggested Answers and Marking Criteria
Question 24 ( c)
Marking Criteria Marks
Provides an excellent explanation, clearly distinguishing between Quote and Job details 3
Provides a reasonable explanation, identifying some differences or similarities between Quote 2 and Job details
Identifies either a difference OR similarity between Quote and Job details l
Quote Details: This refers to the data sent to the Quote Job process by customers. It includes the initial requirements of the job that needs to be done by the company. The data could include such fields as quantity, size, material, dimensions, together with a narrative description of the nature of the job to be completed (or depending on the company, a selection from a drop down list). The data will also include Customer personal details such as first name, surname, contact phone, e-mail address, address of service, bi1Iing address, ...
Job Details: This refers also to data associated with this system, but specifically to the data sent to the Produce Daily Job Sheets process by customers. It includes the assigned customer number (so that the customer details can be retrieved from the Customers file). In addition, it will also contain the same details for the job - quantity, size, material, dimensions, together with a narrative description of the nature of the job to be completed (or depending on the company, a selection from a drop down list). In addition, it will contain the worker assigned to complete this job, and the confirmed details of the scheduled time and date for the job.
Page 7of19
!PT Trial HSC 20 I 6 Suggested Answers and Marking Criteria
Section III - Options
Question 25 - Transaction Processing Systems
Question 25 (a)(i)
Marking Criteria Marks
Excellent description of Batch Processing 2
Recognisable description of Batch Processing, but with some errors or omissions I
Batch processing refers to the collection and storage of transactions over a period of time, so that they can be all submitted sequentially for action in one process. This allows the job to be processed at a time when the computer resources are not being used heavily- perhaps at night, or over a weekend, or when there is sufficient data to make the processing (and loading of all required resources) worthwhile.
Question 25 (a)(ii)
Marking Criteria Marks
Excellent description of Offsite Storage and its significance to Backup and recovery 2
Recognisable description of Off site Storage, but with some errors or omissions
If you 're just backing up to an external hard drive and leaving that hard drive near your computer, the
files aren't completely safe. That backup protects you if your computer dies, or if your external hard
drive dies. It's definitely better to use two separate hardware devices than just one.
But those backups won't protect your data if your home or office catches fire, floods, or is damaged in
another disaster. Or, perhaps someone breaks in and steals or damages your hardware- computer,
external drive, and all. This is also why it's a bad idea to just carry an external backup drive around in
your laptop bag - if your laptop bag is stolen or lost, there goes your computer with your files and its
backups.
Whether you're backing up to an external hard drive, putting copies of your important files in USB
flash drives, burning them to discs, or even backing up to a file server located in your home or office,
there's still a single point of failure. Any damage or theft that occurs at your home or office could
destroy all copies of your important files.
I
An offsite backup is literally backup that's stored "off site" - in a different physical location from
where your main files are. Rather than just having copies of your files on two separate physical
hardware devices, you have them stored in two far apart physical locations. Even if your home or office
burns down and everything is destroyed, there will be a copy of those important files somewhere else.
To have an offsite backup, a backup just has to be stored in another physical location. There are
multiple ways you can go about doing this, depending on what you're comfortable with.
Over the Internet: You could use an Internet backup service like CrashPlan, Carbonite,BackBlaze,
or Mozy that automatically uploads backup copies of your important data to a remote server. You could
also set up your own remote file server and do this the old fashioned way, having backup software
automatically back up to a remote server you control over the Internet.
hrto ://W\vw. ho \vtogeek.com/219197 /vo ure-not-backin g-u p-properlv-un less-vo u-have-o ffsite-backups/
Page 8of19
!PT Trial HSC 2016 Suggested Answers and Marldng Criteria
Question 25 (b )(i)
Marking Criteria Marks
Provides a full description of the technology required for this system
Provides a description of most of the technology required for this system
Identifies some recognisable items of technology required for this system
Software:
Tablem application
Communications Software
Browser
DBMS (to store entered Function data)
Operating system for server and attached device
Hardlvare:
Server to store entered data and software to access it
Webserver to offer pages displayed as part of this app
Firewall to protect data from unauthorised remote access
Modem I Router to allow access to the Internet
DNS servers to store IP addresses and Domain names so the site can be accessed by its URL
Communications hardware
Attached device- such as smartphone, Laptop, Workstation, Tablet with relevant input and display devices, such as virtual keyboard, LCD screen and attached printer, and relevant communications devices such as modem I router and aerial
Question 25 (b )(ii)
3
2
I
Marking Criteria Marks
Provides excellent description of a relevant strategy with justification
Provides good description of a relevant strategy
Demonstrates some understanding of a backup strategy
The tables, seats and allocation of people to seats needs to be stored in a database. The data is read by the software and processed into the visual seating plan viewed by the user.
Different types of tables would be held in a table containing various fields to identify the shape and number of seats possible.
The specific tables for each function would be in another database table. These records would include details of the table location and orientation.
Each guest would have their details, such as name and special requirements stored as a record in the guests table. Each guest record would also include the ID for their specific table together with a chair number indicating their specific seat at that table.
Question 25 (b )(iii)
3
2
I
Marking Criteria Marks
Provides excellent description of the advantages of this system compared to the previous manual approach
Provides good description of the advantages of this system
Provides at least one advantage of this system
Advantages of this on-line web-based approach include:
The data is stored safely at a remote location (where the server is located)
The data is accessible from anywhere there is an Internet co1U1ection
Page 9of 19
3
2
I
IPT Trial HSC 2016 Suggested Answers and Marking Criteria
Multiple people can look at the data concurrently
The data can be effectively backed up regularly, compared to handwritten pages
The data can easily be edited with new guests added seamlessly, those not attending easily removed, and name changes made with little fuss and at the last minute, with the changes reflected across all of the reports produced
The visual display of allocated seats allows the user to see exactly what their seating plan looks like, and changes can be made easily using drag-and-drop until the desired outcome is produced (ensuring no-one is left off the seating plan)
The displays can be in a number of desired formats, without the need to laboriously re-write a number of versions of the guests attending for each of the required reports (alphabetical order, table order, place cards, etc)
The displays are professionally formatted with a choice of font type, size, colour (so the full guest list is easily enlarged simply by printing in a much larger font, for example)
Page 10of19
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
Question 25 ( c )(i)
Marking Criteria Marks
Designs a well-annotated appropriate Table List report 3
Designs an appropriate Table List report 2
Designs a report which shows evidence of some required features l
Function Name: Wedding of Bill Blue to Jane Green Function Date: 15th August, 2016 Date of Report: l" August, 2016 Produced by Tablem.com
Table Number 1 David White Mary White Bill Brown Rose Brown Ann Smith Jane Black
Total number seated at Table 1 ~ 6
Table Number 2 Fred Brown Chris Brown Bob Brown Kath Brown Ann Jones Jane Jones Jeremy Jones Jacqui Jones
Total number seated at Table 2 ~ 8
Total Number of Guests at function: 143
Page 11of19
~------- header
~------- SubSummary information
~------- Summary information I footer
Page number 114
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
Question 25 ( c )(ii)
Marking Criteria
Designs a substantially correct DFD that models this described system using appropriate symbols
Designs a mostly correct DFD that models this described system using appropriate symbols, but with some errors or omissions
Includes some recognisable elements using appropriate symbols of this system
Includes some recognisable elements of this system
Function Organiser
seating plan I guest list
'r---~-~ Functi1m daie, Function name
Visual seat allocation
Table Layout Details
Table List for each table
i=unction Details
Guest f Seat /Table information
Guest/ Seat information J ~
Function Fite
Page 12of19
Venue Manager
Caterer
Marks
4
3
2
I
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
Question 26 - Decision Support Systems
Question 26 (a)(i)
Marking Criteria Marks
Provides excellent description of drilling down as used in an OLAP system 2
Provides some relevant details for drilling down as used in a DSS system I
To allow for data oriented analysis of data stored through use of an OLTP, data is often stored in a multidimensional fashion called a cube. When required, the user can specify which dimension (or feature) of the data they are interested in, and the OLAP system will provide the necessary detail rather than just a summarised form which is available as an overview. It allows navigation of the data from less detailed data to highly detailed data. This allows for appropriate decision making to be based on fact, rather than just 'gut-feel'.
Question 26 (a)(ii)
Marking Criteria Marks
Correctly describes a MIS with a relevant example 2
Provides some relevant information about a :MIS OR a relevant example
MIS is short for management info17nation system or management infonnation services.
Management information system, or MIS, broadly refers to a computer-based system that provides managers with the tools to organize, evaluate and efficiently manage departments within an organization. In order to provide past, present and prediction information, a management information system can include software that helps in decision making, data resources such as databases, the hardware resources of a system, decision support systems, people management and project management applications, and any computerized processes that enable the departments to run efficiently.
http://www.webopedia.com/TERM/M/MI S.html
A management infonnation system (MIS) is a computerized database of financial information organized and programmed in such a way that it produces regular reports on operations for every level of management in a company. It is usually also possible to obtain special reports from the system easily. The main purpose of the :MIS is to give managers feedback about their own performance; top management can monitor the company as a whole. Information displayed by the MIS typically shows 11 actual" data over against 11planned 11 results and results from a year before; thus it measures progress against goals. The MIS receives data from company units (or departments) and functions.
http://www.inc.com/encyclopedia/management-information-systems-mis.html
Page 13of19
I
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
Question 26 (b )(i)
Marking Criteria Marks
Provides correct description of how to duplicate outcomes productively 2
Provides correct description of how to duplicate outcomes 1
In K2, put the formula ~F2.
Then fill this formula across to cell 02.
In this way, if any of the outcomes are changed, they will automatically be reflected in cells K2 to 02.
Question 26 (b )(ii)
Marking Criteria Marks
Provides correct description for a relevant validation process 2
Provides description for a relevant validation process, but with some errors or omissions 1
Apply validation rules to cells in column C and F:J, such that it will display an alert if the value entered in rows 23 - 52 is not a numeric integer less than (say) 5. For Multiple Choice questions in rows 3 - 22, the rule could be: Display an alert if the value entered is not a numeric integer equal to 1.
•f!.i&.fi Input Message Error Alert l
VaUdation criteria---------------
Allow: Ei!J Ignore blank
I Whole number ' I Data:
! between
Minimum:
0 -----~I~ Ma.x!mum:
•_J App!y these ch:i.nges to i:tll other cells with the same settings
I Cle.arAll ]
I Settings , Input Message ii#fuiif.ifyil
@!Show error 11.lcrt after hwalld data is entered
When U$er enters Invalid data, show this error alert:-----
Style: r"-"'-'-----------1 Stop : l L _________ " _____ ,
Error message:
Please only .enter a value of O or l
1ca:nce11 ~
Page 14of19
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
Question 26 ( c )(i)
Marking Criteria
Correctly describes the required formula
Describes the required formula but with some errors or omissions
Demonstrates some understanding of how to reflect the marks under the appropriate outcome
The formula in cell K3 is set to =IF( $C3= F3 ,$D3, "") This formula is then filled across to cell 04, and then down to row 52.
The formula in cell 052 therefore becomes =IF($C52=J52,$D52, "") This specifies that for all cells in the range K3 : 053, if the mark under the specific outcome= the maximum mark allocated for the question, then the actual mark allocated is placed in this cell.
Question 26 ( c )(ii)
Marking Criteria
Correctly explains the purpose of the formula in cell E29
Explains the purpose of the formula in cell E29 but with some errors or omissions
This formula ensures that the mark allocated for this student on this question is reasonable
(that is,< the maximum possible mark). If the entered value (D29) is greater than the maximum possible (C29), an error message will be displayed.
=IF(D29>C29,"error! !"," ")
Conditional formatting is used to present this cell in Red if its contents ="error!!"
Preview of format to use when condition is true:
@:) I Add » J I Delete ...
Question 26 (c)(iii)
Marking Criteria
Format ... ]
Provides correct description for a relevant lookup process to allocate grades
Provides description for a relevant lookup process, but with some errors or omissions
Demonstrates some understanding of how to automatically provide a relevant grade
Marks
3
2
1
Marks
2
1
Marks
3
2
I
A lookup is used to determine the grade from the total for each outcome in cells K59 : 059 using the
cut-off points defined in the table in cells $F57: $G62. The cut-off points are easily edited ifthe task is found to be too easy or too hard, and if it is felt that the defaults of 0, 20, 40, 60, 80, I 00 are not relevant for this task.
The following formula is placed into cell K59, and copied across to cell 059:
=LOOKUP(K59,$F57:$G62)
Page 15of19
!PT Trial HSC 2016 Suggested Answers and Marking Criteria
Question 26 ( d)
Marking Criteria Marks
Provides a thorough and correct analysis of the effectiveness of this solution compared to a manual intuitive allocation of grades, including both positives and negatives
Provides some relevant analysis of the effectiveness of this solution compared to a manual intuitive allocation of grades, including both positives and negatives
Provides some relevant analysis of the effectiveness of this solution compared to a manual intuitive allocation of grades, including EITHER positives OR negatives
Provides at least one point relating to the effectiveness of this solution compared to a manual intuitive allocation of grades EITHER positive OR negative
Advantages of using this automated DSS spreadsheet solution:
• Removes bias from the allocation of grades, as the grades are based purely on the marks awarded in the task
4
3
2
1
• The awarding of marks and grades is more accurate, as all of the totalling and grade allocation is performed by the spreadsheet
• The process is much more transparent and much faster than the manual approach, and does not rely on the judgement of the teacher awarding the grades
• The process does not require much knowledge in the teacher of how to allocate grades-the teacher simply enters the awarded marks for each student once the task has been marked (and once the template has been created for them)
• The results are more easily shared, for example between teachers of the same subject, or with the department head, or with the Deputy Curriculum
• The results are easily exportable directly into reporting software
• The results can be formatted more professionally through the use of colour and font style and size selection
Disadvantages of using this automated DSS spreadsheet solution
• This process relies on appropriate cut-off values being defined for this task
• This process relies on accurate data entry of 'out of marks and awarded mark (any validation process can only detect that the data entered is reasonable, not necessarily correct for this student for each question part)
• There will be (possibly undetected) issues if the outcomes are incorrectly allocated to question parts
• There is a significant effort over and above the marking process to create this template for each new task, and for each student sitting for the task
• There could be issues if this DSS solution is misused ifthe teacher is not appropriately trained to use it, uses it inappropriately for another purpose for which it was not designed, or is unable to interpret the results appropriately
• This solution is not usable if the technology is not available, or if there is no expert teacher available to create the appropriate template for each student for each task
Page 16of19
: !PT Trial HSC 2016 Suggested Answers and Marking Criteria
Question 27 - Multimedia Systems
Question 27 (a) (i)
Marking Criteria Marks
Demonstrates good understanding by clearly outlining the difference between primary and 2 secondary data storage
Demonstrates some understanding by defining primary OR secondary data storage 1
Primary data storage is directly accessible by the CPU and includes RAM. Data stored here is quickly accessed by the CPU and is temporary and volatile. Secondary data storage is non-volatile data storage outside the system and includes permanent storage on CD-ROM's and DVD's and temporary storage on USB drives.
Question 27 (a) (ii)
Marking Criteria Marks
Demonstrates excellent understanding by providing clear definitions of sample size and sample rate for audio files
Demonstrates good understanding by defining sample size and sample rate for audio files
Demonstrates some understanding by defining sample size OR sample rate for audio files
The sample size refers to the number of bits used to represent a digital sample of audio sound. If the sample size increases, then the quality of the sound will also increase but the audio file size will also increase.
The sampling rate is the frequency with which samples of analog sound are collected and is measured in kilohertz (thousands of samples per second). Increasing the sample rate will increase the quality of the sound but also the size of the resulting audio file.
Question 27 (b) (i)
3
2
1
Marking Criteria Marks
Demonstrates good understanding with a correct calculation of the file size 2
Demonstrates some understanding with an attempt to calculate the file size, with some correct 1 elements
Memory size= 161x161x24 I (8 x 1024) kilobytes
Question 27 (b) (ii)
Marking Criteria Marks
Demonstrates good understanding by clearly explaining the effects of increasing resolution 2 AND reducing bit depth on file size and quality
Demonstrates good understanding by clearly explaining the effects of increasing resolution OR I reducing bit depth on file size and quality
Increasing the width and the height by a factor of 4 will increase the number of pixels by a factor of 4x4 = 16. As the number of pixels has increased by 16 then so too will the overall storage increase by a factor of 16. Unfortunately, in terms of quality, all this will do is replace each pixel with a square block of 16 identical pixels. This will not improve the quality of the image at all. There are functions available in photo editing software that will attempt to estimate new colour values but in general it is a difficult process to accurately extrapolate pixels in this way.
Reducing the colour depth from 24 to 8 bit means each pixel now uses 1/3 of the storage. It also means much of the colour data is lost, which will reduce the colour quality of the image. 24 bit can represent some 1.6 million different possible colours whilst 8 bit can represent just 256 different colours.
Overall the file size will alter by a factor of 16 x 1/3 = 16/3 times or over 5 times its current size with a reduction in overall quality.
Page 17of19
IPT Trial HSC 2016 Suggested Answers and Marking Criteria
Question 27 (b) (iii)
Marking Criteria
Demonstrates good understanding by clearly explaining the reasons for the smaller file size
Demonstrates some understanding by explaining a reason for the smaller file size
JPEG files are compressed digital image files. This decreases the size of the file. They use lossy compression, which means that some image quality is lost.
Question 27 (c) (i)
Marking Criteria
Demonstrates excellent understanding by providing clear justification for regarding this website as a multimedia system
Demonstrates good understanding by providing justification for regarding this website as a multimedia system
Demonstrates some understanding by providing some justification for regarding this website as a multimedia system
Marks
2
I
Marks
3
2
I
A multimedia system is a system that delivers any combination of text, graphics, animation, sound or video in an interactive way through a computer/device. www.justinguitar.com is an interactive website. Its contents include text, graphics, sound and video. It is interactive, mainly through the use of hyperlinks. It is therefore a multimedia system
Question 27 ( c) (ii)
Marking Criteria Marks
Demonstrates excellent understanding by providing a clear evaluation of the importance of 3 interactivity in this scenario
Demonstrates good understanding by providing evaluation of the importance of interactivity in 2 this scenario
Demonstrates some understanding by providing some discussion of the importance of I interactivity in this scenario
Interactivity allows the user to control the flow of information. Interaction is provided by means of menu selections, the ability to search, links, video and audio player controls. It is a structure of related information (to learning the guitar) and the means for the user to access the information and the lessons required. In a system such as this website, the interactivity is of prime importance for the user to quickly find and make use of the required lesson material to help learn to play the guitar.
Question 27 (c) (iii)
Marking Criteria Marks
Demonstrates excellent understanding by providing a clear discussion about copyright and its 3 importance in this and similar situations
Demonstrates good understanding by providing discussion about copyright and its importance 2 in this and similar situations
Demonstrates some understanding by providing some discussion about copyright I
Copyright assigns legal rights to the originators of various works including musical material. These rights include the right to reproduce copyrighted work, to distribute copies to the public, to perform and display the work publicly and to grant permission for others to use the work, usually with acknowledgement.
However, it is relatively easy to copy, edit and transmit digital media which makes copyright protection essential for the developer of this website as it grants legal protection against any who would steal the work.
Page 18of19
: !PT Trial HSC 2016 Suggested Answers and Marking Criteria
As the developer of this website makes a living from the lessons, live performances and so forth, stealing the developed materials and breaching copyright would deprive the developer of their income. It may also discourage the developer from freely sharing the information on the website with others and thus depriving them of the ability to learn to play the guitar in this way.
The developer of this website must also ensure that all material displayed on the website is original and not sourced from any other source
This Trial HSC Examination, marking guidelines/suggested answers and mapping grid have been produced to help prepare students for the HSC to the best of our ability.
Individual teachers/schools may alter parts of this product to suit their own requirements.
Page 19of19
Question
1 2 3 4 5 6 7 8 g 10 11 12 13 14 15 16 17 18 19 20
21lal 211bl 21 c 22 a 22 b 22 c 22 ct 23 a 23 b 23 c 23 ct 24 a 24 b 24(c
25 a i 25 a ii 25 b i 25 b ii 25 b iii 25(c i 25 c ii 26 a i 26 a ii 26 b i 26 b ii 26 c i 26 c ii 26 c iii
26 ct 27 a 27 a 27 b 27 b 27 b 27 c 27 c 27(c\(iii
Information Processes and Technology Trial Examination 2016 Mapping Grid
Syllabus Targeted Marks Content outcomes performance
bands 1 Proiect Manaqement H7.1 2-3 1 Proiect Manaaement H1.1 3-4 1 Information Svstems and Databases H5.1 4-5 1 Communication Systems H5.1 4-6 1 Information Svstems and Databases H5.1 3-4 1 Information Svstems and Databases H5.1 2-3 1 Information Systems and Databases H1.1 3-4 1 Information Systems and Databases H1.1 2-3 1 Information Svstems and Databases H2.1 3-4 1 Information Systems and Databases H1.1 2-3 1 Information Systems and Databases H1.1 3-4 1 Information Svstems and Databases H2.1 4-6 1 Communication Systems H6.2 3-4 1 Communication Svstems H2.1 3-4 1 Proiect Manaaement H6.2 3-4 1 Proiect Manaaement H7.2 2-3 1 Information Systems and Databases H2.2 3-4 1 Communication Svstems H2.1 4-5 1 Communication Svstems H7.1 4-5 1 Communication Systems H1.1 4-6 2 Communication Svstems H3.1 3-5 2 Communication Svstems H7.1 3-5 2 Communication Svstems H7.2 3-5 3 Communication Systems H1.2 2-4 3 Communication Svstems H2.1 3-5 4 Proiect Manaaement H2.2 3-5 3 Proiect Manaaement H2.2 3-5 4 Proiect Manaqement H1.1 2-4 3 Communication Svstems H1.2 3-5 3 Proiect Manaaement H5.1 2-5 3 Communication Systems H5.1 4-6 3 Proiect Manaqement H7.2 2-3 2 Proiect Manaaement H2.2 3-4 3 Proiect Manaaement H5.1 4-6 2 Transaction Processinq Systems H1.1 2-4 2 Transaction Processina Svstems H2.2 3-5 3 Transaction Processina Svstems H3.2 3-5 3 Transaction ProcessinQ Systems H1 .1 3-6 3 Transaction Processina Svstems H2.1 3-6 3 Transaction Processina Svstems H3.1 2-5 4 Transaction Processina Svstems H3.1 3-6 2 Decision Suooort Systems H1.1 2-4 2 Decision Sunnort Svstems H1.2 2-5 2 Decision Sunnort Svstems H6.1 2-5 2 Decision Sunnort Systems H6.1 2-4 3 Decision Sunnort Svstems H3.1 3-6 2 Decision Sunnort Svstems H3.1 3-6 3 Decision Sunnort Systems H3.1 3-6 4 Decision Sunnort Svstems H3.1 3-6 2 Multimedia Systems H1.1 2-4 3 Multimedia Svstems H1.1 2-4 2 Multimedia Systems H1.1 2-5 2 Multimedia Svstems H2.1 2-4 2 Multimedia Svstems H1.1 3-5 3 Multimedia Systems H3.1 3-5 3 Multimedia Svstems H4.1 2-5 3 Multimedia Svstems H4.1 2-5