[Year 12 IT Apps] VITTA ITA exam 2 - my ideas of errata

Sam Denniston samdenniston at gmail.com
Mon Oct 15 17:25:08 EST 2007


I am not a VITTA member and I am trying to download the errata from the
VITTA site after purchasing the sample exams.

Has anyone got a copy of the fixed solutions they could send me??


On 15/10/07 5:01 PM, "Mark Kelly" <kel at mckinnonsc.vic.edu.au> wrote:

> hmmm.  I thought I was working from the officially published exams, but
> I did some proofreading of them and might have been left with older
> versions.
> 
> Or VITTA corrected and reissued them after I notified them of my worries
> earlier last month.
> 
> Not sure!  Still, if your copy is correct, rejoice  :-)
> 
> Geoff Moss wrote:
>> Mark
>> I wonder, are there 2 sets of papers and suggested answers out there?
>> 
>> For Question 3, my question paper said:
>> "Which type of backup only includes those files that have changed since
>> the last full backup of the system?"
>> 
>> Based on my paper, for question 3 you have altered the question, hence
>> your question.  Differential backup is correct, as it correctly answers
>> the question.  Incremental backups may be done daily and each
>> incremental backup will be the backup since the last Full backup and the
>> previous incremental backup/s.  (Incremental could be correct if it was
>> the first incremental backup since the full backup - but let's not add
>> to the question.)
>> In Short Answer Question 5 the suggested answers I received from VITTA
>> were:
>> 
>> ModelID = Integer
>> 
>> ModelStreetAddress = Text  (There is no alphanumeric data type for
>> Access, text allows the use of alphanumeric characters)
>> 
>> ModelHomePhone = Text
>> 
>> ModelMobilePhone = Text
>> 
>> For 5b, the suggested VITTA answers in my set were:
>> 
>>      Validation rule: (>=3000 and <=3999) or (>=8000 and <=8999)
>> 
>>      Validation text: Please enter a postcode beginning with a 3 or an 8.
>> 
>> 
>> 
>> 
>> 
>> This agrees with your contention.
>> 
>> Question 11
>> a.  Physical security measures
>> Mark said:
>>> Suggested answer:
>>> 
>>> € A voice recognition device can be used to authorise users to access
>>> rooms, equipment or information.
>>> 
>>> Physical?  Electronic, surely!  And not a very sensible option, if you
>>> ask me.
>> 
>> Voice recognition was listed in logical, not physical, security measures
>> in the suggested answers.
>> 
>> Mark adds:
>>> These all seem inappropriate for such a small setup.  What about locked
>>> doors, barred windows?
>> 
>> and I concur
>> 
>> Question 11 c.  suggested answer was:
>> Software: If a server is purchased to act as a central storage location
>> for the network, a network operating system would be a good addition.
>> This software controls the traffic on the network and defines how the
>> devices connected in the network will communicate with each other.
>> 
>> Other software may include: email, file transfer protocol, Internet browser
>> 
>> 
>> For Question 11d. the question in my set of exam papers was:
>> d. Explain how Privacy legislation impacts upon Adam¹s security and
>> storage measures.
>> 
>>  However the suggested answer included reference to the Privacy
>> Amendment (Private Sector) Act 2000.
>> 
>> Question 12:
>> Mark said:
>>> The answer is a bit of a mess.
>>> Tasks B and D are 14 weeks in the chart, not 6 as in the data.
>>> This pushes tasks E and I way too far late.
>> 
>> In the chart and data tasks B and D were 6 weeks each in my qusetion
>> paper, but task I was 5 weeks, not 4 in the chart.
>> 
>> Question 12b.
>>> b. Which task cannot begin without others being finished?
>>> Suggested answer: J
>>> 
>>> An unfair question.  I assume the ³S² on the end of ³others² demands a
>>> task that has more than one predecessor.  It should say so.  To be fair
>>> it should ask which task has to wait for more than one other task to
>>> finish before it can begin.  I bet 99% of kids would be confused and say
>>> that there are 6 viable tasks.
>> 
>> I fully concur.
>> 
>> Hence my starting question: I wonder, are there 2 sets of papers and
>> suggested answers out there?
>> Raise you 3 cents!
>> Geoff Moss
>> 
>> RMIT
>> 
>> ---------------------
>> ----- Original Message ----- From: "Mark Kelly" <kel at mckinnonsc.vic.edu.au>
>> To: "Year 12 IT Applications Teachers' Mailing List"
>> <itapps at edulists.com.au>
>> Sent: Monday, October 15, 2007 1:36 PM
>> Subject: [Year 12 IT Apps] VITTA ITA exam 2 - my ideas of errata
>> 
>> 
>>> Hi all.  I could not find errata for VITTA ITA exam 2 on the VITTA site,
>>> so here are my thoughts.  Take them as you will.  I don't aim to offend.
>>> 
>>> -- 
>>> 
>>> VITTA ITA Practice Exam 2
>>> 
>>> SECTION A ­ Multiple-choice
>>> 
>>> Question 1
>>> Which of the following enables several LANS to connect over a WAN?
>>> Suggested answer: D. Router.
>>> 
>>> A router protects a LAN from the outside world, but its role is not
>>> principally to enable communications.  I suspect the best answer would
>>> be a modem.
>>> 
>>> Question 3
>>> Which type of backup uses two sets of backup media and backs up the most
>>> recent changes on the second media?
>>> Suggested answer: B. Differential.
>>> 
>>> This can¹t be right.,  The question is very odd.  Two sets of backup
>>> media? From http://www.backuptool.com/incremental%20backup.htm...
>>> 
>>> "three backup modes:
>>> € Full: All files that match your selection are included into the backup.
>>> € Incremental: Only those files will be included which have been changed
>>> since the last backup.
>>> € Differential: Only those files will be included which have been
>>> changed since the last FULL backup."
>>> 
>>> Question 4
>>> The main purpose of validating a solution is to
>>> Suggested answer: C. Ensure that data entered into the computer is
>>> correct and complete.
>>> 
>>> No!  Validation ensures data is reasonable, not correct!
>>> 
>>> Question 5
>>> The manager of Nail Nirvana needs to decide whether one of the nail
>>> technicians can take holiday leave in
>>> October. What type of decision needs to be made?
>>> Suggested answer: B. Tactical.
>>> 
>>> I¹d argue operational.  It¹s a pretty low-level decision, and not aimed
>>> to accomplish a larger strategic goal.
>>> 
>>> Question 6
>>> A real estate agency that is closing down would like to sell its client
>>> database to another agency in order to recoup some of its losses. What
>>> privacy legislation should influence the real estate agency¹s decision?
>>> Suggested answer: A. Privacy Amendment (Private Sector) Act 2000.
>>> 
>>> No. The amendments are no longer part of the laws to be discussed in
>>> ITA.  Refer to the definition of ³Legal obligations² in the study
>>> design, page 50.
>>> 
>>> Question 12
>>> Which form of documentation is not usually provided in on-line form?
>>> Suggested answer: B. User manual.
>>> 
>>> This is strange.  I¹ve seen many online user manuals.  And does ³online²
>>> mean ³on the internet², or just ³electronic²?  There¹s a big difference.
>>>  If  it¹s properly interpreted as ³on the internet² then the answer is
>>> clearly ³tool tips² or ³context-sensitive² which are not used in a
>>> website.  I¹ve hardly ever seen quick-start guides online.  In fact,
>>> ³user manual² is the worst possible answer of the 4.
>>> 
>>> Question 20
>>> Two widely used formats for on-screen user documentation are
>>> Suggested answer: A. PDF and Hypertext.
>>> 
>>> PDF is primarily designed, AFAIK, as a printable format!  It lacks most
>>> of the distinctive features of documentation that is primarily designed
>>> to be viewed onscreen, such as animation, hyperlinks, transitions etc.
>>> 
>>> SECTION B ­ Short answer Questions
>>> 
>>> Question 1
>>> Explain how a modem enables users to access the Internet.
>>> 
>>> Sample answer: A modem modulates digital data it receives from a
>>> computer into an analog signal so that it can be transported over
>>> telephone lines. The receiving modem demodulates the analog signal
>>> received from the telephone line into a digital signal so that the
>>> receiving computer can receive it. This ³translation² of signals is
>>> required so that communication across the Internet can take place.
>>> 
>>> 
>>> A modem is, for most people today, a digital device for ADSL or cable
>>> internet that has no modulation or demodulation happening!  The question
>>> should have referred to analogue modems if it wanted this answer.
>>> 
>>> 
>>> Question 5
>>> Marvellous Modelling wants to keep a database of its models and intends
>>> to set up the following fields:
>>> 
>>> Field Data Type
>>> ModelId Primary Key
>>> 
>>> No.  A primary key is not a data type
>>> 
>>> ModelFirstName Text
>>> ModelLastName Text
>>> ModelStreetAddress Alphanumeric
>>> 
>>> Which DBMS offers alphanumeric type? Text type is used for pure text or
>>> typable characters (i.e. alphanumeric)
>>> 
>>> ModelPostcode Number
>>> ModelHomePhone Number
>>> ModelMobilePhone Number
>>> 
>>> Arghhh, no.  Phone numbers should not be stored as numbers.  They
>>> exclude characters like spaces, parentheses, + for international dialing
>>> etc.
>>> 
>>> b. Determine validation rules and validation text for two of the fields.
>>> Field: ModelPostcode
>>> Suggested answer: Validation rule: >=3000 and <=3999
>>> 
>>> A quibbly 'No': New Melbourne postcodes include numbers in the 8000
>>> range.
>>> 
>>> Validation text: Please enter a postcode beginning with 3.
>>> 
>>> Field: ModelHeight
>>> 
>>> Suggested answer: Validation rule: >=165
>>> Suggested answer: Validation text: Please enter a number greater than or
>>> equal to 165
>>> 
>>> A silly rule, if you ask me.  Models MUST be tall nowadays?  Including
>>> hand models and child models?
>>> 
>>> Question 11
>>> Adam, an accountant and owner of a growing taxation business is
>>> concerned about the security of his data as his clientele base expands.
>>> Currently, Adam and his wife Anna (who is also an accountant) work on
>>> standalone computers and save their data daily to the hard drive and
>>> then back up the week¹s data on CD every Saturday morning. The CD¹s are
>>> kept in a locked safe in their house. Adam and Anna also have individual
>>> Internet and email access. Adam has a broadband connection while Anna¹s
>>> Internet connection is dial up and ties up the family phone when she is
>>> using it. Adam has begun advertising for an assistant to help them with
>>> administrative tasks such as producing business correspondence,
>>> answering the phone, photocopying, etc.
>>> 
>>> a. Suggest and describe two physical and two logical security measures
>>> that Adam can employ to protect the data.
>>> 
>>> Physical security measures
>>> 
>>> Suggested answer:
>>> 
>>> € A voice recognition device can be used to authorise users to access
>>> rooms, equipment or information.
>>> 
>>> Physical?  Electronic, surely!  And not a very sensible option, if you
>>> ask me.
>>> 
>>> € Multiple copies of backup should be made and kept off site. One copy
>>> is not sufficient if theft or damage occurs in the house.
>>> 
>>> Backups are not security; certainly not physical security!
>>> 
>>> € Video surveillance would also be a useful security measure. Video
>>> cameras capture the activity in the house.
>>> 
>>> These all seem inappropriate for such a small setup.  What about locked
>>> doors, barred windows?
>>> 
>>> c. Identify one software item and one hardware item that will be
>>> required in setting up the network and explain their role or usefulness
>>> in the network.
>>> 
>>> Suggested answer: Software: the most essential software for a network is
>>> the network operating system. This software controls the traffic on the
>>> network and defines how the devices connected in the network will
>>> communicate with each other.
>>> 
>>> Only if they need a server ­ which I¹d say they would not.
>>> 
>>> d. Explain how the Privacy Amendment (Private Sector) Act 2000 impacts
>>> upon Adam¹s security and storage measures.
>>> 
>>> Again, this amendment is not used in ITA.
>>> 
>>> 
>>> Question 12
>>> "The organisation Gems & Jewels would like to develop a database to keep
>>> track of all the different items of jewellery they have in stock. The
>>> management have written down the tasks which are required to construct
>>> the database and have added the time each is expected to take and which
>>> tasks cannot begin without others being finished."
>>> 
>>> The answer is a bit of a mess.
>>> Tasks B and D are 14 weeks in the chart, not 6 as in the data.
>>> This pushes tasks E and I way too far late.
>>> It should look like this:  (see attachment)
>>> 
>>> b. Which task cannot begin without others being finished?
>>> Suggested answer: J
>>> 
>>> An unfair question.  I assume the ³S² on the end of ³others² demands a
>>> task that has more than one predecessor.  It should say so.  To be fair
>>> it should ask which task has to wait for more than one other task to
>>> finish before it can begin.  I bet 99% of kids would be confused and say
>>> that there are 6 viable tasks.
>>> 
>>> ---
>>> 
>>> Let me see, that makes about 18c worth.
>>> 
>>> Any other opinions out there?
>>> 
>>> -- 
>>> Mark Kelly
>>> Manager - Information Systems
>>> McKinnon Secondary College
>>> McKinnon Rd McKinnon 3204, Victoria, Australia
>>> Direct line / Voicemail: 8520 9085
>>> School Phone +613 8520 9000
>>> School Fax +613 95789253
>>> kel AT mckinnonsc.vic.edu.au
>>> 
>>> Webmaster - http://www.mckinnonsc.vic.edu.au
>>> IT Lecture notes: http://vceit.com
>>> Moderator: IT Applications Mailing List
>>> 
>>> You'll know when we are officially a civilised race: our schools have
>>> all the money they need and the Air Force has to run a chook raffle to
>>> buy a new bomber.
>>> _______________________________________________
>>> http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
>>> IT Applications Mailing List kindly supported by
>>> http://www.vcaa.vic.edu.auvce/studies/infotech/itapplications3-4.html
>>> - Victorian Curriculum and Assessment Authority and
>>> http://www.vitta.org.au  - VITTA Victorian Information Technology
>>> Teachers Association Inc
>> 
>> 
>> -----------------------------------------------------------------------------
>> --- 
>> 
>> 
>> 
>> No virus found in this incoming message.
>> Checked by AVG Free Edition.
>> Version: 7.5.488 / Virus Database: 269.14.10/1070 - Release Date:
>> 14/10/2007 9:22 AM
>> 
>> _______________________________________________
>> http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
>> IT Applications Mailing List kindly supported by
>> http://www.vcaa.vic.edu.auvce/studies/infotech/itapplications3-4.html -
>> Victorian Curriculum and Assessment Authority and
>> http://www.vitta.org.au  - VITTA Victorian Information Technology
>> Teachers Association Inc
>> 
>> 





More information about the itapps mailing list