<HTML>
<HEAD>
<TITLE>Re: [Year 12 IT Apps] are we in the cone of silence or ...</TITLE>
</HEAD>
<BODY>
<FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'>On 10/11/10 11:20 AM, "Hewett, W G" <<a href="Hewett.W.G@edumail.vic.gov.au">Hewett.W.G@edumail.vic.gov.au</a>> wrote:<BR>
</SPAN></FONT><SPAN STYLE='font-size:11pt'><FONT FACE="Arial">Does the word "equipment" in Q3 suggest a hardware and not software solution?<BR>
</FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><HR ALIGN=CENTER SIZE="3" WIDTH="95%">In terms of ‘consistency’re: swipe card questions over previous examinations then yes C could be a correct choice. <BR>
Zach Alexakos<BR>
<HR ALIGN=CENTER SIZE="3" WIDTH="95%">On 10/11/10 11:45 AM, "Zach Alexakos" <<a href="alexakos.zach.z@edumail.vic.gov.au">alexakos.zach.z@edumail.vic.gov.au</a>> wrote:<BR>
<BR>
</FONT></SPAN><BLOCKQUOTE><SPAN STYLE='font-size:11pt'><FONT FACE="Calibri, Verdana, Helvetica, Arial">2007 ITA Exam- Multiple Choice<BR>
Question 2<BR>
A bank teller uses a swipe card and a login with password to access clients? bank accounts.<BR>
This security is an example of<BR>
A. physical and biometric.<BR>
B. electronic and physical.<BR>
C. biometric and biometric.<BR>
D. electronic and electronic.<BR>
<BR>
>From memory this question caused much debate as well- answer is listed as D with explanation as and I quote “Many students were distracted by electronic and physical (option B) and did not correctly identify the security measures used to prevent unauthorised access to data and information as electronic and electronic”. <BR>
</FONT></SPAN><FONT SIZE="1"><FONT FACE="Times New Roman Bold"><SPAN STYLE='font-size:8pt'><BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'>Whoever writes these exams likes their ‘swipe cards’. <BR>
<BR>
<BR>
Zach Alexakos<BR>
Looking elsewhere for 2011. <BR>
<BR>
<BR>
<BR>
On 10/11/10 11:20 AM, "Hewett, W G" <<a href="Hewett.W.G@edumail.vic.gov.au">Hewett.W.G@edumail.vic.gov.au</a>> wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><SPAN STYLE='font-size:11pt'><FONT FACE="Arial">Does the word "equipment" in Q3 suggest a hardware and not software solution?<BR>
</FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"> <BR>
</FONT><FONT FACE="Arial">Exam was on the money for my level of kids, although my ESL student would have struggled with the nuances of language. Many had to to re read the answers.<BR>
</FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"> <BR>
</FONT><FONT FACE="Arial">Wayne Hewett<BR>
</FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"> <BR>
ROSEBUD SECONDARY COLLEGE<BR>
<BR>
<HR ALIGN=CENTER SIZE="3" WIDTH="100%"></FONT><FONT FACE="Tahoma, Verdana, Helvetica, Arial"><B>From:</B> <a href="itapps-bounces@edulists.com.au">itapps-bounces@edulists.com.au</a> on behalf of Zach Alexakos<BR>
<B>Sent:</B> Wed 10/11/2010 10:37 AM<BR>
<B>To:</B> Year 12 IT Applications Teachers' Mailing List<BR>
<B>Subject:</B> Re: [Year 12 IT Apps] are we in the cone of silence or ...<BR>
</FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><BR>
Awful question- Keyboard swipe, wasn’t that what the kid in Terminator2 the movie used to access the ATM machine?<BR>
<BR>
Answer A. <BR>
<BR>
CCTV won’t let you detect software based unauthorised access- <BR>
<BR>
I think there was a similar question on an IPM exam many years ago- I might have a look to see if I can find it. <BR>
<BR>
<BR>
Zach Alexakos<BR>
Looking for a Year 12 class in 2011. <BR>
<BR>
<BR>
<BR>
<BR>
On 10/11/10 10:10 AM, "Kevork Krozian" <<a href="K.Krozian@fhc.vic.edu.au">K.Krozian@fhc.vic.edu.au</a>> wrote:<BR>
<BR>
</FONT></SPAN><BLOCKQUOTE><SPAN STYLE='font-size:11pt'><FONT FACE="Calibri, Verdana, Helvetica, Arial"><FONT COLOR="#1F497D">As I was doing a solution to the exam as soon as I got a hold of it, I kept rewriting that question by replacing “detect” with “prevent” to make sense of it.<BR>
I went with CCTV as well.<BR>
<BR>
Kind Regards<BR>
<BR>
</FONT><BR>
<FONT COLOR="#1F497D">Kevork Krozian<BR>
Digital Learning Manager<BR>
Forest Hill College<BR>
Tel: 0419 356 034<BR>
<BR>
</FONT><BR>
</FONT></SPAN><FONT SIZE="2"><FONT FACE="Tahoma, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:10pt'><B>From:</B> <a href="itapps-bounces@edulists.com.au">itapps-bounces@edulists.com.au</a> [<a href="mailto:itapps-bounces@edulists.com.au">mailto:itapps-bounces@edulists.com.au</a>] <B>On Behalf Of </B>Paul Miller<BR>
<B>Sent:</B> Wednesday, 10 November 2010 9:43 AM<BR>
<B>To:</B> Year 12 IT Applications Teachers' Mailing List<BR>
<B>Subject:</B> Re: [Year 12 IT Apps] are we in the cone of silence or ...<BR>
</SPAN></FONT></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN></FONT><FONT COLOR="#1F497D"><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'>Not a great question, but in my opinion, I would say that a keyboard swipe authenticates the user and has the possibility of logging all actions on the computer. But then I would have imagined that auditor trails/logs would be the form of detection, not the keyboard swipe. Ridiculously, I would probably agree and say that of the 4 options, CCTV would be the best.<BR>
<BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT SIZE="2"><FONT FACE="Tahoma, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:10pt'><B>From:</B> <a href="itapps-bounces@edulists.com.au">itapps-bounces@edulists.com.au</a> [<a href="mailto:itapps-bounces@edulists.com.au">mailto:itapps-bounces@edulists.com.au</a>] <B>On Behalf Of </B>Bane, Janet A<BR>
<B>Sent:</B> Wednesday, 10 November 2010 9:18 AM<BR>
<B>To:</B> Year 12 IT Applications Teachers' Mailing List<BR>
<B>Subject:</B> Re: [Year 12 IT Apps] are we in the cone of silence or ...<BR>
</SPAN></FONT></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT SIZE="2"><FONT FACE="Arial"><SPAN STYLE='font-size:10pt'>I'm still ruminating on that one...<BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT SIZE="2"><FONT FACE="Arial"><SPAN STYLE='font-size:10pt'>I googled keyboard swipe and even they couldn't tell me what it was. Is it something like they use at the bank where a card gets swiped through some magnetic reader and it reads customer details? I can't see how that would detect unauthorised access to a pasword protected file though.... <BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT SIZE="2"><FONT FACE="Arial"><SPAN STYLE='font-size:10pt'>Encryption software. Hmm It doesn't say the password is encrypted. So I'm not sure thats relevant either<BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT SIZE="2"><FONT FACE="Arial"><SPAN STYLE='font-size:10pt'>Closed circuit TV - well it could detect if someone trying to access a file, if it was zoomed right in at the keyboard, at the right place at the right time - surely not a practical solution though!<BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT SIZE="2"><FONT FACE="Arial"><SPAN STYLE='font-size:10pt'>Virus protection software - maybe, although I wouldn't have thought detecting unauthorised access to a password protected file would be its primary function.<BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT SIZE="2"><FONT FACE="Arial"><SPAN STYLE='font-size:10pt'>So if I had to have a punt I would go for c. maybe!<BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT SIZE="2"><FONT FACE="Arial"><SPAN STYLE='font-size:10pt'>regards<BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN></FONT><FONT COLOR="#800080"><FONT SIZE="4"><FONT FACE="Verdana, Helvetica, Arial"><SPAN STYLE='font-size:13pt'><I>J</I></SPAN></FONT></FONT></FONT><FONT SIZE="4"><FONT FACE="Verdana, Helvetica, Arial"><SPAN STYLE='font-size:13pt'><I><FONT COLOR="#FFFF00">a</FONT><FONT COLOR="#FF0000">n</FONT><FONT COLOR="#FF00FF">e</FONT><FONT COLOR="#00FF00">t </FONT><FONT COLOR="#008000">B</FONT><FONT COLOR="#800000">a</FONT><FONT COLOR="#0000FF">n</FONT><FONT COLOR="#00FFFF">e</FONT></I></SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'> </SPAN></FONT><FONT COLOR="#800080"><FONT SIZE="4"><FONT FACE="Verdana, Helvetica, Arial"><SPAN STYLE='font-size:13pt'><I>Patterson River SC</I></SPAN></FONT></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'> <BR>
</SPAN></FONT>
<P ALIGN=CENTER>
<FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><HR ALIGN=CENTER SIZE="2" WIDTH="100%"></SPAN></FONT>
<P>
<FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT SIZE="2"><FONT FACE="Tahoma, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:10pt'><B>From:</B> <a href="itapps-bounces@edulists.com.au">itapps-bounces@edulists.com.au</a> on behalf of Mark Scott<BR>
<B>Sent:</B> Wed 10-Nov-10 8:37 AM<BR>
<B>To:</B> Year 12 IT Applications Teachers' Mailing List<BR>
<B>Subject:</B> Re: [Year 12 IT Apps] are we in the cone of silence or ...<BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><BR>
</SPAN><FONT SIZE="2"><SPAN STYLE='font-size:10pt'>Too easy, but having said that...<BR>
<BR>
Would be interested in what people thought of MC Q3<BR>
<BR>
thanks<BR>
Mark Scott<BR>
Luther College<BR>
<BR>
"The busier you get, the slower you walk" anon<BR>
<BR>
<BR>
-----Original Message-----<BR>
From: <a href="itapps-bounces@edulists.com.au">itapps-bounces@edulists.com.au</a> [<a href="mailto:itapps-bounces@edulists.com.au">mailto:itapps-bounces@edulists.com.au</a>] On Behalf Of Brendyn Hancock<BR>
Sent: Wednesday, 10 November 2010 8:06 AM<BR>
To: Year 12 IT Applications Teachers' Mailing List<BR>
Subject: [Year 12 IT Apps] are we in the cone of silence or ...<BR>
<BR>
All<BR>
<BR>
Exam comments.<BR>
<BR>
B<BR>
<BR>
Brendyn Hancock<BR>
ICT Manager<BR>
Nagle College<BR>
PO Box 507<BR>
BAIRNSDALE VIC 3875<BR>
p 03 5152 6122 ext954<BR>
f 03 5152 6220<BR>
<BR>
Disclaimer: This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects.<BR>
Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of Nagle College. < <a href="http://www.nagle.vic.edu.au">http://www.nagle.vic.edu.au</a> <<a href="http://www.nagle.vic.edu.au/">http://www.nagle.vic.edu.au/</a>> <<a href="http://www.nagle.vic.edu.au/">http://www.nagle.vic.edu.au/</a>> ><BR>
<BR>
<BR>
<BR>
Scanned by Sonar.<BR>
Date: 2010-11-10 08:06:23.144<BR>
From: <a href="bhancock@nagle.vic.edu.au">bhancock@nagle.vic.edu.au</a><BR>
To: <a href="itapps@edulists.com.au">itapps@edulists.com.au</a><BR>
Profile: default_out<BR>
Mail id: challenge-9336782927b78-0<BR>
<BR>
_______________________________________________<BR>
<a href="http://www.edulists.com.au">http://www.edulists.com.au</a> <<a href="http://www.edulists.com.au/">http://www.edulists.com.au/</a>> <<a href="http://www.edulists.com.au/">http://www.edulists.com.au/</a>> - FAQ, resources, subscribe, unsubscribe IT Applications Mailing List kindly supported by <a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html">http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html</a> - Victorian Curriculum and Assessment Authority and <a href="http://www.vitta.org.au">http://www.vitta.org.au</a> <<a href="http://www.vitta.org.au/">http://www.vitta.org.au/</a>> <<a href="http://www.vitta.org.au/">http://www.vitta.org.au/</a>> - VITTA Victorian Information Technology Teachers Association Inc<BR>
<BR>
_______________________________________________<BR>
<a href="http://www.edulists.com.au">http://www.edulists.com.au</a> <<a href="http://www.edulists.com.au/">http://www.edulists.com.au/</a>> <<a href="http://www.edulists.com.au/">http://www.edulists.com.au/</a>> - FAQ, resources, subscribe, unsubscribe<BR>
IT Applications Mailing List kindly supported by<BR>
<a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html">http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html</a> - Victorian Curriculum and Assessment Authority and<BR>
<a href="http://www.vitta.org.au">http://www.vitta.org.au</a> <<a href="http://www.vitta.org.au/">http://www.vitta.org.au/</a>> <<a href="http://www.vitta.org.au/">http://www.vitta.org.au/</a>> - VITTA Victorian Information Technology Teachers Association Inc<BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT>
<P ALIGN=CENTER>
<FONT FACE="Times New Roman"><SPAN STYLE='font-size:12pt'><HR ALIGN=CENTER SIZE="2" WIDTH="100%"></SPAN></FONT>
<P>
<FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
</SPAN></FONT><FONT COLOR="#808080"><FONT SIZE="2"><FONT FACE="Arial"><SPAN STYLE='font-size:10pt'>The contents of this email are confidential. Any unauthorised use of the This email (including any attachments) is confidential. If you are not the intended recipient you must not copy, use, disclose, distribute or rely on the information contained in it. Confidentiality and legal privilege attached to this communication are not waived or lost by reason of mistaken delivery to you. Our Lady of the Sacred Heart College Bentleigh does not guarantee that this email or attachments are unaffected by computer virus, corruption or other defects. Any views expressed in this message are those of the individual sender and may not necessarily reflect the views of Our Lady of the Sacred Heart College Bentleigh.<BR>
</SPAN></FONT></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><BR>
<HR ALIGN=CENTER SIZE="3" WIDTH="95%"></SPAN></FONT><FONT SIZE="2"><FONT FACE="Consolas, Courier New, Courier"><SPAN STYLE='font-size:10pt'>_______________________________________________<BR>
<a href="http://www.edulists.com.au">http://www.edulists.com.au</a> <<a href="http://www.edulists.com.au/">http://www.edulists.com.au/</a>> - FAQ, resources, subscribe, unsubscribe<BR>
IT Applications Mailing List kindly supported by<BR>
<a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html">http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html</a> - Victorian Curriculum and Assessment Authority and<BR>
<a href="http://www.vitta.org.au">http://www.vitta.org.au</a> <<a href="http://www.vitta.org.au/">http://www.vitta.org.au/</a>> - VITTA Victorian Information Technology Teachers Association Inc <BR>
</SPAN></FONT></FONT><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'><B>Important - </B>This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.<BR>
<BR>
<BR>
<B>Important - </B>This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.<BR>
<BR>
<HR ALIGN=CENTER SIZE="3" WIDTH="95%"></SPAN></FONT></BLOCKQUOTE></BLOCKQUOTE><FONT SIZE="2"><FONT FACE="Consolas, Courier New, Courier"><SPAN STYLE='font-size:10pt'>_______________________________________________<BR>
<a href="http://www.edulists.com.au">http://www.edulists.com.au</a> - FAQ, resources, subscribe, unsubscribe<BR>
IT Applications Mailing List kindly supported by<BR>
<a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html">http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html</a> - Victorian Curriculum and Assessment Authority and<BR>
<a href="http://www.vitta.org.au">http://www.vitta.org.au</a> - VITTA Victorian Information Technology Teachers Association Inc<BR>
</SPAN></FONT></FONT></BLOCKQUOTE>
<p></p><p><b>Important - </b>This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.</p>
</BODY>
</HTML>