[Year 12 IT Apps] VITTA ITA exam 2 - my ideas of errata
Sam Denniston
samdenniston at gmail.com
Mon Oct 15 17:25:08 EST 2007
I am not a VITTA member and I am trying to download the errata from the
VITTA site after purchasing the sample exams.
Has anyone got a copy of the fixed solutions they could send me??
On 15/10/07 5:01 PM, "Mark Kelly" <kel at mckinnonsc.vic.edu.au> wrote:
> hmmm. I thought I was working from the officially published exams, but
> I did some proofreading of them and might have been left with older
> versions.
>
> Or VITTA corrected and reissued them after I notified them of my worries
> earlier last month.
>
> Not sure! Still, if your copy is correct, rejoice :-)
>
> Geoff Moss wrote:
>> Mark
>> I wonder, are there 2 sets of papers and suggested answers out there?
>>
>> For Question 3, my question paper said:
>> "Which type of backup only includes those files that have changed since
>> the last full backup of the system?"
>>
>> Based on my paper, for question 3 you have altered the question, hence
>> your question. Differential backup is correct, as it correctly answers
>> the question. Incremental backups may be done daily and each
>> incremental backup will be the backup since the last Full backup and the
>> previous incremental backup/s. (Incremental could be correct if it was
>> the first incremental backup since the full backup - but let's not add
>> to the question.)
>> In Short Answer Question 5 the suggested answers I received from VITTA
>> were:
>>
>> ModelID = Integer
>>
>> ModelStreetAddress = Text (There is no alphanumeric data type for
>> Access, text allows the use of alphanumeric characters)
>>
>> ModelHomePhone = Text
>>
>> ModelMobilePhone = Text
>>
>> For 5b, the suggested VITTA answers in my set were:
>>
>> Validation rule: (>=3000 and <=3999) or (>=8000 and <=8999)
>>
>> Validation text: Please enter a postcode beginning with a 3 or an 8.
>>
>>
>>
>>
>>
>> This agrees with your contention.
>>
>> Question 11
>> a. Physical security measures
>> Mark said:
>>> Suggested answer:
>>>
>>> A voice recognition device can be used to authorise users to access
>>> rooms, equipment or information.
>>>
>>> Physical? Electronic, surely! And not a very sensible option, if you
>>> ask me.
>>
>> Voice recognition was listed in logical, not physical, security measures
>> in the suggested answers.
>>
>> Mark adds:
>>> These all seem inappropriate for such a small setup. What about locked
>>> doors, barred windows?
>>
>> and I concur
>>
>> Question 11 c. suggested answer was:
>> Software: If a server is purchased to act as a central storage location
>> for the network, a network operating system would be a good addition.
>> This software controls the traffic on the network and defines how the
>> devices connected in the network will communicate with each other.
>>
>> Other software may include: email, file transfer protocol, Internet browser
>>
>>
>> For Question 11d. the question in my set of exam papers was:
>> d. Explain how Privacy legislation impacts upon Adam¹s security and
>> storage measures.
>>
>> However the suggested answer included reference to the Privacy
>> Amendment (Private Sector) Act 2000.
>>
>> Question 12:
>> Mark said:
>>> The answer is a bit of a mess.
>>> Tasks B and D are 14 weeks in the chart, not 6 as in the data.
>>> This pushes tasks E and I way too far late.
>>
>> In the chart and data tasks B and D were 6 weeks each in my qusetion
>> paper, but task I was 5 weeks, not 4 in the chart.
>>
>> Question 12b.
>>> b. Which task cannot begin without others being finished?
>>> Suggested answer: J
>>>
>>> An unfair question. I assume the ³S² on the end of ³others² demands a
>>> task that has more than one predecessor. It should say so. To be fair
>>> it should ask which task has to wait for more than one other task to
>>> finish before it can begin. I bet 99% of kids would be confused and say
>>> that there are 6 viable tasks.
>>
>> I fully concur.
>>
>> Hence my starting question: I wonder, are there 2 sets of papers and
>> suggested answers out there?
>> Raise you 3 cents!
>> Geoff Moss
>>
>> RMIT
>>
>> ---------------------
>> ----- Original Message ----- From: "Mark Kelly" <kel at mckinnonsc.vic.edu.au>
>> To: "Year 12 IT Applications Teachers' Mailing List"
>> <itapps at edulists.com.au>
>> Sent: Monday, October 15, 2007 1:36 PM
>> Subject: [Year 12 IT Apps] VITTA ITA exam 2 - my ideas of errata
>>
>>
>>> Hi all. I could not find errata for VITTA ITA exam 2 on the VITTA site,
>>> so here are my thoughts. Take them as you will. I don't aim to offend.
>>>
>>> --
>>>
>>> VITTA ITA Practice Exam 2
>>>
>>> SECTION A Multiple-choice
>>>
>>> Question 1
>>> Which of the following enables several LANS to connect over a WAN?
>>> Suggested answer: D. Router.
>>>
>>> A router protects a LAN from the outside world, but its role is not
>>> principally to enable communications. I suspect the best answer would
>>> be a modem.
>>>
>>> Question 3
>>> Which type of backup uses two sets of backup media and backs up the most
>>> recent changes on the second media?
>>> Suggested answer: B. Differential.
>>>
>>> This can¹t be right., The question is very odd. Two sets of backup
>>> media? From http://www.backuptool.com/incremental%20backup.htm...
>>>
>>> "three backup modes:
>>> Full: All files that match your selection are included into the backup.
>>> Incremental: Only those files will be included which have been changed
>>> since the last backup.
>>> Differential: Only those files will be included which have been
>>> changed since the last FULL backup."
>>>
>>> Question 4
>>> The main purpose of validating a solution is to
>>> Suggested answer: C. Ensure that data entered into the computer is
>>> correct and complete.
>>>
>>> No! Validation ensures data is reasonable, not correct!
>>>
>>> Question 5
>>> The manager of Nail Nirvana needs to decide whether one of the nail
>>> technicians can take holiday leave in
>>> October. What type of decision needs to be made?
>>> Suggested answer: B. Tactical.
>>>
>>> I¹d argue operational. It¹s a pretty low-level decision, and not aimed
>>> to accomplish a larger strategic goal.
>>>
>>> Question 6
>>> A real estate agency that is closing down would like to sell its client
>>> database to another agency in order to recoup some of its losses. What
>>> privacy legislation should influence the real estate agency¹s decision?
>>> Suggested answer: A. Privacy Amendment (Private Sector) Act 2000.
>>>
>>> No. The amendments are no longer part of the laws to be discussed in
>>> ITA. Refer to the definition of ³Legal obligations² in the study
>>> design, page 50.
>>>
>>> Question 12
>>> Which form of documentation is not usually provided in on-line form?
>>> Suggested answer: B. User manual.
>>>
>>> This is strange. I¹ve seen many online user manuals. And does ³online²
>>> mean ³on the internet², or just ³electronic²? There¹s a big difference.
>>> If it¹s properly interpreted as ³on the internet² then the answer is
>>> clearly ³tool tips² or ³context-sensitive² which are not used in a
>>> website. I¹ve hardly ever seen quick-start guides online. In fact,
>>> ³user manual² is the worst possible answer of the 4.
>>>
>>> Question 20
>>> Two widely used formats for on-screen user documentation are
>>> Suggested answer: A. PDF and Hypertext.
>>>
>>> PDF is primarily designed, AFAIK, as a printable format! It lacks most
>>> of the distinctive features of documentation that is primarily designed
>>> to be viewed onscreen, such as animation, hyperlinks, transitions etc.
>>>
>>> SECTION B Short answer Questions
>>>
>>> Question 1
>>> Explain how a modem enables users to access the Internet.
>>>
>>> Sample answer: A modem modulates digital data it receives from a
>>> computer into an analog signal so that it can be transported over
>>> telephone lines. The receiving modem demodulates the analog signal
>>> received from the telephone line into a digital signal so that the
>>> receiving computer can receive it. This ³translation² of signals is
>>> required so that communication across the Internet can take place.
>>>
>>>
>>> A modem is, for most people today, a digital device for ADSL or cable
>>> internet that has no modulation or demodulation happening! The question
>>> should have referred to analogue modems if it wanted this answer.
>>>
>>>
>>> Question 5
>>> Marvellous Modelling wants to keep a database of its models and intends
>>> to set up the following fields:
>>>
>>> Field Data Type
>>> ModelId Primary Key
>>>
>>> No. A primary key is not a data type
>>>
>>> ModelFirstName Text
>>> ModelLastName Text
>>> ModelStreetAddress Alphanumeric
>>>
>>> Which DBMS offers alphanumeric type? Text type is used for pure text or
>>> typable characters (i.e. alphanumeric)
>>>
>>> ModelPostcode Number
>>> ModelHomePhone Number
>>> ModelMobilePhone Number
>>>
>>> Arghhh, no. Phone numbers should not be stored as numbers. They
>>> exclude characters like spaces, parentheses, + for international dialing
>>> etc.
>>>
>>> b. Determine validation rules and validation text for two of the fields.
>>> Field: ModelPostcode
>>> Suggested answer: Validation rule: >=3000 and <=3999
>>>
>>> A quibbly 'No': New Melbourne postcodes include numbers in the 8000
>>> range.
>>>
>>> Validation text: Please enter a postcode beginning with 3.
>>>
>>> Field: ModelHeight
>>>
>>> Suggested answer: Validation rule: >=165
>>> Suggested answer: Validation text: Please enter a number greater than or
>>> equal to 165
>>>
>>> A silly rule, if you ask me. Models MUST be tall nowadays? Including
>>> hand models and child models?
>>>
>>> Question 11
>>> Adam, an accountant and owner of a growing taxation business is
>>> concerned about the security of his data as his clientele base expands.
>>> Currently, Adam and his wife Anna (who is also an accountant) work on
>>> standalone computers and save their data daily to the hard drive and
>>> then back up the week¹s data on CD every Saturday morning. The CD¹s are
>>> kept in a locked safe in their house. Adam and Anna also have individual
>>> Internet and email access. Adam has a broadband connection while Anna¹s
>>> Internet connection is dial up and ties up the family phone when she is
>>> using it. Adam has begun advertising for an assistant to help them with
>>> administrative tasks such as producing business correspondence,
>>> answering the phone, photocopying, etc.
>>>
>>> a. Suggest and describe two physical and two logical security measures
>>> that Adam can employ to protect the data.
>>>
>>> Physical security measures
>>>
>>> Suggested answer:
>>>
>>> A voice recognition device can be used to authorise users to access
>>> rooms, equipment or information.
>>>
>>> Physical? Electronic, surely! And not a very sensible option, if you
>>> ask me.
>>>
>>> Multiple copies of backup should be made and kept off site. One copy
>>> is not sufficient if theft or damage occurs in the house.
>>>
>>> Backups are not security; certainly not physical security!
>>>
>>> Video surveillance would also be a useful security measure. Video
>>> cameras capture the activity in the house.
>>>
>>> These all seem inappropriate for such a small setup. What about locked
>>> doors, barred windows?
>>>
>>> c. Identify one software item and one hardware item that will be
>>> required in setting up the network and explain their role or usefulness
>>> in the network.
>>>
>>> Suggested answer: Software: the most essential software for a network is
>>> the network operating system. This software controls the traffic on the
>>> network and defines how the devices connected in the network will
>>> communicate with each other.
>>>
>>> Only if they need a server which I¹d say they would not.
>>>
>>> d. Explain how the Privacy Amendment (Private Sector) Act 2000 impacts
>>> upon Adam¹s security and storage measures.
>>>
>>> Again, this amendment is not used in ITA.
>>>
>>>
>>> Question 12
>>> "The organisation Gems & Jewels would like to develop a database to keep
>>> track of all the different items of jewellery they have in stock. The
>>> management have written down the tasks which are required to construct
>>> the database and have added the time each is expected to take and which
>>> tasks cannot begin without others being finished."
>>>
>>> The answer is a bit of a mess.
>>> Tasks B and D are 14 weeks in the chart, not 6 as in the data.
>>> This pushes tasks E and I way too far late.
>>> It should look like this: (see attachment)
>>>
>>> b. Which task cannot begin without others being finished?
>>> Suggested answer: J
>>>
>>> An unfair question. I assume the ³S² on the end of ³others² demands a
>>> task that has more than one predecessor. It should say so. To be fair
>>> it should ask which task has to wait for more than one other task to
>>> finish before it can begin. I bet 99% of kids would be confused and say
>>> that there are 6 viable tasks.
>>>
>>> ---
>>>
>>> Let me see, that makes about 18c worth.
>>>
>>> Any other opinions out there?
>>>
>>> --
>>> Mark Kelly
>>> Manager - Information Systems
>>> McKinnon Secondary College
>>> McKinnon Rd McKinnon 3204, Victoria, Australia
>>> Direct line / Voicemail: 8520 9085
>>> School Phone +613 8520 9000
>>> School Fax +613 95789253
>>> kel AT mckinnonsc.vic.edu.au
>>>
>>> Webmaster - http://www.mckinnonsc.vic.edu.au
>>> IT Lecture notes: http://vceit.com
>>> Moderator: IT Applications Mailing List
>>>
>>> You'll know when we are officially a civilised race: our schools have
>>> all the money they need and the Air Force has to run a chook raffle to
>>> buy a new bomber.
>>> _______________________________________________
>>> http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
>>> IT Applications Mailing List kindly supported by
>>> http://www.vcaa.vic.edu.auvce/studies/infotech/itapplications3-4.html
>>> - Victorian Curriculum and Assessment Authority and
>>> http://www.vitta.org.au - VITTA Victorian Information Technology
>>> Teachers Association Inc
>>
>>
>> -----------------------------------------------------------------------------
>> ---
>>
>>
>>
>> No virus found in this incoming message.
>> Checked by AVG Free Edition.
>> Version: 7.5.488 / Virus Database: 269.14.10/1070 - Release Date:
>> 14/10/2007 9:22 AM
>>
>> _______________________________________________
>> http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
>> IT Applications Mailing List kindly supported by
>> http://www.vcaa.vic.edu.auvce/studies/infotech/itapplications3-4.html -
>> Victorian Curriculum and Assessment Authority and
>> http://www.vitta.org.au - VITTA Victorian Information Technology
>> Teachers Association Inc
>>
>>
More information about the itapps
mailing list