[Year 12 IT Apps] are we in the cone of silence or ...AND MCQ 11
Geoff Moss
geoffmoss37 at bigpond.com
Wed Nov 10 17:28:36 EST 2010
Janet
I tended to think along the same lines as your techie as well on MCQ 3.
Correct for 16 too. The primary keys are indicated by the key and the links
do not relate only primary key fields.
Mark, in MCQ 11 (on our website Post Mortem) your reasoning is correct,
except you indicated D was correct instead of C. Thanks again for your
first up Post Mortem. I, among others applaud your efforts to put your
evaluationout there.
Regards
Geoff Moss
RMIT
----- Original Message -----
From: "Bane, Janet A" <bane.janet.a at edumail.vic.gov.au>
To: "Year 12 IT Applications Teachers' Mailing List"
<itapps at edulists.com.au>
Sent: Wednesday, November 10, 2010 10:27 AM
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
I have just been speaking to our technician who is a gun at these things.
He was scratching his head about question 3 as well and didn't think any of
the suggested answers would work. When pushed, he suggested d - virus
protection software might be the answer. The reason being that it might
detect a hacker trying to get into password protected files. I'm still not
sure!
Question 16 was pretty easy IMO - answer is B. The common field *Music
teacher ID* is in all three tables, so its common fields in different
tables.
regards
Janet Bane
Patterson River SC
________________________________
From: itapps-bounces at edulists.com.au on behalf of ATKINSON-BUCK, Damien
Sent: Wed 10-Nov-10 10:11 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
I think the key is that CCTV is the only one that detects anything, B & C
are keeping the data safe and A is non-existent.
I have issues with the wording of MC 16 - assuming A is correct, but
shouldn't it be Primary and Foreign keys in different tables?
Damien Atkinson-Buck
Member of Academic Staff (Secondary)
________________________________
cid:image002.jpg at 01CA7D93.5FFD22D0 <http://myivanhoe.net/>
PO BOX 91 The Ridgeway, Ivanhoe, Victoria 3079 Australia
Telephone +61 3 9490 3848 Facsimile +61 3 9490 3490
mailto:damien.atkinson-buck at ivanhoe.com.au
<mailto:damien.atkinson-buck at ivanhoe.com.au>
http://myivanhoe.net <http://myivanhoe.net/>
From: Paul Miller [mailto:pmiller at olsh.vic.edu.au]
Sent: Wednesday, 10 November 2010 9:43 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
Not a great question, but in my opinion, I would say that a keyboard swipe
authenticates the user and has the possibility of logging all actions on the
computer. But then I would have imagined that auditor trails/logs would be
the form of detection, not the keyboard swipe. Ridiculously, I would
probably agree and say that of the 4 options, CCTV would be the best.
From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au]
On Behalf Of Bane, Janet A
Sent: Wednesday, 10 November 2010 9:18 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
I'm still ruminating on that one...
I googled keyboard swipe and even they couldn't tell me what it was. Is it
something like they use at the bank where a card gets swiped through some
magnetic reader and it reads customer details? I can't see how that would
detect unauthorised access to a pasword protected file though....
Encryption software. Hmm It doesn't say the password is encrypted. So
I'm not sure thats relevant either
Closed circuit TV - well it could detect if someone trying to access a file,
if it was zoomed right in at the keyboard, at the right place at the right
time - surely not a practical solution though!
Virus protection software - maybe, although I wouldn't have thought
detecting unauthorised access to a password protected file would be its
primary function.
So if I had to have a punt I would go for c. maybe!
regards
Janet Bane
Patterson River SC
________________________________
From: itapps-bounces at edulists.com.au on behalf of Mark Scott
Sent: Wed 10-Nov-10 8:37 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
Too easy, but having said that...
Would be interested in what people thought of MC Q3
thanks
Mark Scott
Luther College
"The busier you get, the slower you walk" anon
-----Original Message-----
From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au]
On Behalf Of Brendyn Hancock
Sent: Wednesday, 10 November 2010 8:06 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: [Year 12 IT Apps] are we in the cone of silence or ...
All
Exam comments.
B
Brendyn Hancock
ICT Manager
Nagle College
PO Box 507
BAIRNSDALE VIC 3875
p 03 5152 6122 ext954
f 03 5152 6220
Disclaimer: This email and any attachments may be confidential. If received
in error, please contact us and delete all copies. Before opening or using
attachments check them for viruses and defects.
Regardless of any loss, damage or consequence, whether caused by the
negligence of the sender or not, resulting directly or indirectly from the
use of any attached files our liability is limited to resupplying any
affected attachments. Any representations or opinions expressed are those of
the individual sender, and not necessarily those of Nagle College. <
http://www.nagle.vic.edu.au <http://www.nagle.vic.edu.au/> >
Scanned by Sonar.
Date: 2010-11-10 08:06:23.144
From: bhancock at nagle.vic.edu.au
To: itapps at edulists.com.au
Profile: default_out
Mail id: challenge-9336782927b78-0
_______________________________________________
http://www.edulists.com.au <http://www.edulists.com.au/> - FAQ, resources,
subscribe, unsubscribe IT Applications Mailing List kindly supported by
http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
Victorian Curriculum and Assessment Authority and http://www.vitta.org.au
<http://www.vitta.org.au/> - VITTA Victorian Information Technology
Teachers Association Inc
_______________________________________________
http://www.edulists.com.au <http://www.edulists.com.au/> - FAQ, resources,
subscribe, unsubscribe
IT Applications Mailing List kindly supported by
http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
Victorian Curriculum and Assessment Authority and
http://www.vitta.org.au <http://www.vitta.org.au/> - VITTA Victorian
Information Technology Teachers Association Inc
________________________________
The contents of this email are confidential. Any unauthorised use of the
This email (including any attachments) is confidential. If you are not the
intended recipient you must not copy, use, disclose, distribute or rely on
the information contained in it. Confidentiality and legal privilege
attached to this communication are not waived or lost by reason of mistaken
delivery to you. Our Lady of the Sacred Heart College Bentleigh does not
guarantee that this email or attachments are unaffected by computer virus,
corruption or other defects. Any views expressed in this message are those
of the individual sender and may not necessarily reflect the views of Our
Lady of the Sacred Heart College Bentleigh.
Privacy, Virus and Copyright Warning
The information contained in this electronic message (e-mail), and any files
transmitted with it:
* is intended for the named recipients only. If you have received this in
error, please advise the sender and delete it and any copies immediately;
* Any personal information in this email must be used in accordance with the
Privacy Act 1988 and this always applies even if it has been sent to you in
error.
* represents the views of the sender and does not necessarily represent the
views or formal advice of Ivanhoe Grammar School;
* may be subject to Copyright, so no further use should be made of it
without the author's permission.
The School does not represent or warrant that the email or any files
attached do not contain errors or are free from computer viruses or other
defects nor does it accept responsibility for any loss or damage resulting
directly or indirectly from the use of the email or any attached files.
Important - This email and any attachments may be confidential. If received
in error, please contact us and delete all copies. Before opening or using
attachments check them for viruses and defects. Regardless of any loss,
damage or consequence, whether caused by the negligence of the sender or
not, resulting directly or indirectly from the use of any attached files our
liability is limited to resupplying any affected attachments. Any
representations or opinions expressed are those of the individual sender,
and not necessarily those of the Department of Education and Early Childhood
Development.
--------------------------------------------------------------------------------
> _______________________________________________
> http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
> IT Applications Mailing List kindly supported by
> http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
> Victorian Curriculum and Assessment Authority and
> http://www.vitta.org.au - VITTA Victorian Information Technology Teachers
> Association Inc
More information about the itapps
mailing list