[Year 12 IT Apps] are we in the cone of silence or ...AND MCQ 11

Mark KELLY kel at mckinnonsc.vic.edu.au
Wed Nov 10 18:55:52 EST 2010


Yep. You're right, Geoff.  Stupid keyboard of mine put the D and C keys too
closely together   ;-)

On 10 November 2010 17:28, Geoff Moss <geoffmoss37 at bigpond.com> wrote:

> Janet
>
> I tended to think along the same lines as your techie as well on MCQ 3.
>
> Correct for 16 too.  The primary keys are indicated by the key and the
> links
> do not relate only primary key fields.
>
> Mark, in MCQ 11 (on our website Post Mortem) your reasoning is correct,
> except you indicated D was correct instead of C.  Thanks again for your
> first up Post Mortem.  I, among others applaud your efforts to put your
> evaluationout there.
>
> Regards
>
> Geoff Moss
> RMIT
>
> ----- Original Message -----
> From: "Bane, Janet A" <bane.janet.a at edumail.vic.gov.au>
> To: "Year 12 IT Applications Teachers' Mailing List"
> <itapps at edulists.com.au>
> Sent: Wednesday, November 10, 2010 10:27 AM
> Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
>
>
> I have just been speaking to our technician who is a gun at these things.
> He was scratching his head about question 3 as well and didn't think any of
> the suggested answers would work.  When pushed, he suggested d - virus
> protection software might be the answer.  The reason being that it might
> detect a hacker trying to get into password protected files. I'm still not
> sure!
>
> Question 16 was pretty easy IMO - answer is B.   The common field *Music
> teacher ID* is in all three tables, so its common fields in different
> tables.
>
> regards
>
>
>
> Janet Bane
> Patterson River SC
>
> ________________________________
>
> From: itapps-bounces at edulists.com.au on behalf of ATKINSON-BUCK, Damien
> Sent: Wed 10-Nov-10 10:11 AM
> To: Year 12 IT Applications Teachers' Mailing List
> Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
>
>
>
> I think the key is that CCTV is the only one that detects anything, B & C
> are keeping the data safe and A is non-existent.
>
> I have issues with the wording of MC 16 - assuming A is correct, but
> shouldn't it be Primary and Foreign keys in different tables?
>
>
>
> Damien Atkinson-Buck
> Member of Academic Staff (Secondary)
>
> ________________________________
>
> cid:image002.jpg at 01CA7D93.5FFD22D0 <http://myivanhoe.net/>
>
>
>
> PO BOX 91 The Ridgeway, Ivanhoe, Victoria 3079 Australia
> Telephone +61 3 9490 3848 Facsimile +61 3 9490 3490
> mailto:damien.atkinson-buck at ivanhoe.com.au
> <mailto:damien.atkinson-buck at ivanhoe.com.au>
> http://myivanhoe.net <http://myivanhoe.net/>
>
>
>
>
>
>
>
>
> From: Paul Miller [mailto:pmiller at olsh.vic.edu.au]
> Sent: Wednesday, 10 November 2010 9:43 AM
> To: Year 12 IT Applications Teachers' Mailing List
> Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
>
>
>
> Not a great question, but in my opinion, I would say that a keyboard swipe
> authenticates the user and has the possibility of logging all actions on
> the
> computer. But then I would have imagined that auditor trails/logs would be
> the form of detection, not the keyboard swipe. Ridiculously, I would
> probably agree and say that of the 4 options, CCTV would be the best.
>
>
>
> From: itapps-bounces at edulists.com.au [mailto:
> itapps-bounces at edulists.com.au]
> On Behalf Of Bane, Janet A
> Sent: Wednesday, 10 November 2010 9:18 AM
> To: Year 12 IT Applications Teachers' Mailing List
> Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
>
>
>
> I'm still ruminating on that one...
>
>
>
> I googled keyboard swipe and even they couldn't tell me what it was.  Is it
> something like they use at the bank where a card gets swiped through some
> magnetic reader and it reads customer details?  I can't see how that would
> detect unauthorised access to a pasword protected file though....
>
>
>
> Encryption software.   Hmm   It doesn't say the password is encrypted.  So
> I'm not sure thats relevant either
>
>
>
> Closed circuit TV - well it could detect if someone trying to access a
> file,
> if it was zoomed right in at the keyboard, at the right place at the right
> time - surely not a practical solution though!
>
>
>
> Virus protection software - maybe, although I wouldn't have thought
> detecting unauthorised access to a password protected file would be its
> primary function.
>
>
>
> So if I had to have a punt I would go for c.  maybe!
>
>
>
> regards
>
>
>
> Janet Bane
> Patterson River SC
>
>
>
> ________________________________
>
> From: itapps-bounces at edulists.com.au on behalf of Mark Scott
> Sent: Wed 10-Nov-10 8:37 AM
> To: Year 12 IT Applications Teachers' Mailing List
> Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...
>
>
>
> Too easy, but having said that...
>
> Would be interested in what people thought of MC Q3
>
> thanks
> Mark Scott
> Luther College
>
> "The busier you get, the slower you walk" anon
>
>
> -----Original Message-----
> From: itapps-bounces at edulists.com.au [mailto:
> itapps-bounces at edulists.com.au]
> On Behalf Of Brendyn Hancock
> Sent: Wednesday, 10 November 2010 8:06 AM
> To: Year 12 IT Applications Teachers' Mailing List
> Subject: [Year 12 IT Apps] are we in the cone of silence or ...
>
> All
>
> Exam comments.
>
> B
>
> Brendyn Hancock
> ICT Manager
> Nagle College
> PO Box 507
> BAIRNSDALE VIC 3875
> p 03 5152 6122 ext954
> f 03 5152 6220
>
> Disclaimer: This email and any attachments may be confidential. If received
> in error, please contact us and delete all copies. Before opening or using
> attachments check them for viruses and defects.
> Regardless of any loss, damage or consequence, whether caused by the
> negligence of the sender or not, resulting directly or indirectly from the
> use of any attached files our liability is limited to resupplying any
> affected attachments. Any representations or opinions expressed are those
> of
> the individual sender, and not necessarily those of Nagle College. <
> http://www.nagle.vic.edu.au <http://www.nagle.vic.edu.au/> >
>
>
>
> Scanned by Sonar.
> Date: 2010-11-10 08:06:23.144
> From: bhancock at nagle.vic.edu.au
> To: itapps at edulists.com.au
> Profile: default_out
> Mail id: challenge-9336782927b78-0
>
> _______________________________________________
> http://www.edulists.com.au <http://www.edulists.com.au/>  - FAQ,
> resources,
> subscribe, unsubscribe IT Applications Mailing List kindly supported by
> http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
> Victorian Curriculum and Assessment Authority and http://www.vitta.org.au
> <http://www.vitta.org.au/>   - VITTA Victorian Information Technology
> Teachers Association Inc
>
> _______________________________________________
> http://www.edulists.com.au <http://www.edulists.com.au/>  - FAQ,
> resources,
> subscribe, unsubscribe
> IT Applications Mailing List kindly supported by
> http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
> Victorian Curriculum and Assessment Authority and
> http://www.vitta.org.au <http://www.vitta.org.au/>   - VITTA Victorian
> Information Technology Teachers Association Inc
>
>
>
> ________________________________
>
> The contents of this email are confidential. Any unauthorised use of the
> This email (including any attachments) is confidential. If you are not the
> intended recipient you must not copy, use, disclose, distribute or rely on
> the information contained in it. Confidentiality and legal privilege
> attached to this communication are not waived or lost by reason of mistaken
> delivery to you. Our Lady of the Sacred Heart College Bentleigh does not
> guarantee that this email or attachments are unaffected by computer virus,
> corruption or other defects. Any views expressed in this message are those
> of the individual sender and may not necessarily reflect the views of Our
> Lady of the Sacred Heart College Bentleigh.
>
>
>
>
>
> Privacy, Virus and Copyright Warning
>
> The information contained in this electronic message (e-mail), and any
> files
> transmitted with it:
>
> * is intended for the named recipients only. If you have received this in
> error, please advise the sender and delete it and any copies immediately;
> * Any personal information in this email must be used in accordance with
> the
> Privacy Act 1988 and this always applies even if it has been sent to you in
> error.
> * represents the views of the sender and does not necessarily represent the
> views or formal advice of Ivanhoe Grammar School;
> * may be subject to Copyright, so no further use should be made of it
> without the author's permission.
>
> The School does not represent or warrant that the email or any files
> attached do not contain errors or are free from computer viruses or other
> defects nor does it accept responsibility for any loss or damage resulting
> directly or indirectly from the use of the email or any attached files.
>
> Important - This email and any attachments may be confidential. If received
> in error, please contact us and delete all copies. Before opening or using
> attachments check them for viruses and defects. Regardless of any loss,
> damage or consequence, whether caused by the negligence of the sender or
> not, resulting directly or indirectly from the use of any attached files
> our
> liability is limited to resupplying any affected attachments. Any
> representations or opinions expressed are those of the individual sender,
> and not necessarily those of the Department of Education and Early
> Childhood
> Development.
>
>
>
>
> --------------------------------------------------------------------------------
>
>
> > _______________________________________________
> > http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
> > IT Applications Mailing List kindly supported by
> > http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
> > Victorian Curriculum and Assessment Authority and
> > http://www.vitta.org.au  - VITTA Victorian Information Technology
> Teachers
> > Association Inc
>
> _______________________________________________
> http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
> IT Applications Mailing List kindly supported by
> http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
> Victorian Curriculum and Assessment Authority and
> http://www.vitta.org.au  - VITTA Victorian Information Technology Teachers
> Association Inc
>



-- 
Mark Kelly
Manager Information Systems
Reporting Manager
IT Learning Area Manager

McKinnon Secondary College
McKinnon Rd McKinnon 3204
Victoria, Australia
Direct line / Voicemail: +613 8520 9085
Fax +613 9578 9253
kel at mckinnonsc.vic.edu.au

VCE IT Lecture Notes: http://vceit.com
Moderator: IT Applications Edulist

My cow died on this day two years ago.  I know because I noted it in my
dairy.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/itapps/attachments/20101110/0adadcee/attachment.html 


More information about the itapps mailing list