· Web viewComputing: Software Development. Assessment. Contributions towards the study score....

45
Computing: Software Development Assessment Contributions towards the study score U3O1 Programming practice SAC 10% U3O2 Analysis & Design SAT 15% U4O1 Software Solutions SAT 15% U4O2 Interactions & Impact SAC 10% Written examination 50% Written examination When & where Thursday 14 th November 2019 3:00pm to 5:15pm Reading Time: 15 minutes Writing Time: 120 minutes Location School should have notified you! Materials Bring Pens & pencils Highlighters & erasers Sharpeners & rulers Calculator – Scientific Watch Don’t Bring Whiteout Dictionary

Transcript of   · Web viewComputing: Software Development. Assessment. Contributions towards the study score....

Computing: Software Development

AssessmentContributions towards the study score

U3O1 Programming practice SAC 10%U3O2 Analysis & Design SAT 15%U4O1 Software Solutions SAT 15%U4O2 Interactions & Impact SAC 10%

Written examination 50%

Written examination

When & where

Thursday 14th November 20193:00pm to 5:15pm

Reading Time:15 minutes

Writing Time: 120 minutes

LocationSchool should have notified you!

Materials

BringPens & pencilsHighlighters & erasersSharpeners & rulersCalculator – Scientific Watch

Don’t BringWhiteoutDictionary

Structure

Three sections

Section A (20 marks)Multiple Choice Questions

Section B (20 marks)Short-answer questions

Section C – Case Study (60 marks)Short and extended-answer questions

Total marks = 100

Timing

120 minutes writing time/ 100 marks

1 mark = 1 minute 12 seconds2 marks = 2 min 24 sec3 marks = 3 min 36 secs4 marks = 4 min 48 sec

Keep an eye on the time!

Reading Time

15 minutes

Read every question carefully – Section A, B, C & Case StudyYou cannot mark the paper in anyway during this timeStart to develop a plan!!!Answer the questions you are confident with first!

Writing Time

You may complete the questions in any orderBegin by answering the questions you feel the most comfortable withGood idea to start with the multiple choiceThis may allow you to be calm, gather your thoughts.

Contents

The exam content will be based upon the study design

Key knowledge Key skills Glossary Problem-solving methodology

Key knowledge checklist

U3O1: Programming practiceDon’t know

Know a little

Know a lot

1 characteristics of data types

2 types of data structures, including one-dimensional arrays (single data type, integer index) and records (varying data types, field index)

3 methods of representing designs, including data dictionaries, object descriptions, mock-ups and pseudocode

4 formatting and structural characteristics of input and output, including XML file formats

5 a programming language as a method for developing working modules that meet specific needs

6 processing features of a programming language, including instructions, procedures, methods, functions and control structures

7 techniques for linear and binary searching

8 techniques for checking that modules meet design specifications, including trace tables and test data

9 purposes and characteristics of internal documentation, including comments and meaningful names.

U3O2: Analysis and design

Don’t know

Know a

little

Know a lot

1Project management concepts and processes, including milestones and dependencies (concepts), and task identification, sequencing, time allocation, resources and documentation using Gantt charts (processes)

2 Techniques for collecting data to determine needs and requirements, including interviews, surveys and observation

3Tools and techniques for depicting the interfaces between solutions, users and networks, including use case diagrams created using Unified Modelling Language

4 Features of context diagrams and data flow diagrams

5 Features of functional and non-functional requirements

6 Constraints that influence solutions, including economic, legal, social, technical and useability factors

7 Factors that determine the scope of solutions

8 Features and purposes of software requirements specifications

9 Techniques for generating design ideas

10 Criteria for evaluating alternative design ideas and the efficiency and effectiveness of solutions

11 Methods of expressing software designs using data dictionaries, object descriptions, mock-ups and pseudocode

12 Factors influencing the design of solutions, including useability, affordability, security, interoperability and marketability

13 Characteristics of user experiences, including efficient and effective user interfaces

14 Naming conventions for solution elements

15 Security considerations influencing the design of solutions, including data protection and authentication

16 Styles of modern application architecture, including mobile, rich client, peer-to-peer and internet applications

17 Types of goals and objectives of organisations and information systems

18 Key legal requirements relating to the ownership and privacy of data and information

U4O1: Software solutions

Don’t know

Know a

little

Know a lot

1 Ways in which file size, storage medium and organisation of files affect access of data.

2 Uses of data structures to organise and manipulate data, including associative arrays (or dictionaries or hash tables).

3 Procedures and techniques for handling and managing files, including security, archiving, backing up and disposing of files.

4 Processing features of a programming language, including instructions, procedures, methods, functions and control structures.

5Algorithms for sorting, including selection sort and quick sort and their suitability for a given purpose, measured in terms of algorithm complexity and sort time.

6 Characteristics of efficient and effective solutions.

7 Techniques for checking that coded solutions meet design specifications, including construction of test data.

8 Validation techniques, including existence checking, range checking and type checking.

9 Techniques for testing the useability of solutions and forms of documenting test results.

10 Techniques for recording the progress of projects, including annotations, adjustments to tasks and timeframes, and logs.

11 Factors that influence the effectiveness of project plans.

12 Strategies for evaluating the efficiency and effectiveness of solutions and project plans.

U4O2: Interactions and impact

Don’t know

Know a little

Know a lot

1 Characteristics of wired and wireless networks

2 Reasons why individuals and organisations use information systems

3 Goals and objectives of information systems

4 Types of interactions (inputs and outputs) generated by information systems

5 Key legislation that affects how organisations control the storage, communication and disposal of their data and information.

6 Characteristics of data that has integrity, including accuracy, timeliness, reasonableness, authenticity, correctness

7Types and causes of accidental, deliberate and events-based threats to the integrity and security of data and information shared between information systems

8 Physical and software controls used by organisations to secure the storage and communication of data in a networked environment

9 Role of hardware, software and technical protocols in managing, controlling and securing data shared between information systems

10 Advantages and disadvantages for stakeholders affected by the operation of information systems

11 The impact of diminished data integrity on dependent systems

12 Tools and techniques for tracing transactions between users of information systems.

13 Data management practices that cause conflict between information systems, including data mining

14 Technical underpinnings of intranets, the internet and virtual private networks

Multiple choice

You need a pencil – and an eraser!Answer questions on multiple choice answer sheetCircle the answer on the question booklet itselfThen colour in the answer sheet

You do not have to complete questions in orderStart with the questions you feel most comfortable withRead each question carefully a number of timesUnderstand what the question is asking?

Underline key words

QuestionA physical control used to prevent unauthorised access to data and information is

A. encryptionB. locks on doorsC. username and passwordD. system protection software

QuestionA procedure checks user input for reasonableness. This type of check is called

A. user acceptance testing.B. evaluation.C. validation.D. testing.

Complete the questions you canThen move onto Sections B & C

Remember to come back to these later!!!

Do not leave any of the multiple choice questions blank

You have at the least a 25% chance of guessing the correct answer

Question 1Testing involves establishing tests and expected results.

At what stage of the problem-solving methodology does testing occur?

A. designB. analysisC. evaluationD. development

Question 2Trace tables are used to test algorithms.

Which of the following best describes the characteristics of a trace table?

A. multi-column, multi-row, shows each variableB. multi-column, multi-row, shows each variable and the result displayedC. multi-column, multi-row, shows actual result, gives evidence of the test workingD. multi-column, multi-row, shows expected result, shows actual result, gives evidence of the test working

Question 3XML describes a set of rules for

A. displaying words in a document.B. inserting pictures into a document.C. designing the layout of a web page.D. formatting data for transferring and storage.

Question 6The Privacy Act 1988 is best described as legislation that outlines how

A. individuals should use personal information.B. organisations should collect and use health records.C. organisations should collect and use personal information.D. organisations should collect and use copyright information.

Question 8Mobile application architecture involves

A. facilitating the streaming of media.B. writing software for wireless devices.C. eliminating dedicated backend servers.D. providing functionality independent of a server.

Question 9An example of an evaluation criterion that measures the efficiency of a software solution is that the software solution should

A. generate accurate output.B. have an intuitive and easy-to-use interface.C. produce the output within a practical time frame.D. produce output that does not require the user to source additional information or perform additionalcalculations.

Question 10Joe has downloaded some information from the internet for his school project. Part of his project is toprovide details of the integrity of his information.

This means Joe must check his information for characteristics including

A. accuracy, effectiveness, security and timeliness.B. accuracy, timeliness, reasonableness and security.C. accuracy, authenticity, timeliness and reasonableness.D. accuracy, authenticity, effectiveness and reasonableness.

Question 12The following numbers are to be sorted in ascending order.

14, 7, 69, 27, 15, 23, 11, 10

After the second pass, the numbers are in the following order.

7, 10, 69, 27, 15, 23, 11, 14

What type of algorithm was used to sort the array?

A. quick sortB. bubble sortC. binary sortD. selection sort

Question 13The following is an example of pseudocode.

WHILE X is not equal to 9Add 1 to X

END WHILE

The lines of pseudocode above are best described as a

A. control structure.B. procedure.C. function.D. method.

Short answer questions

Answer structure

Use the number of marks as a guide to the number of points needed

1 mark = 1 word or sentence2 marks = 2 points or sentences3 marks = 3 points or sentences4 marks = 4 points or sentences

Number of Lines

The number of lines gives an indication of how much to write - you can write more or lessYou can use blank spaceBetter answers tend to be concise

Handwriting

Write as neatly as possible, legible is good! Print if you must.Use ink pen rather than pencilStart each point on a new lineUnderline key words in each sentence

Verbs = Doing Words

For each question identify the action you are expected to take:

Circle the verb or doing word

Question (1 mark)State one control structure used in programming.

Question (2 marks)Give one example of a physical security control. Explain its purpose.

Question (2 marks)Explain the purpose of a software requirement specification (SRS).

Question (3 marks)Aardvark Security requires a solution that will send an alert to a security officer if an alarm is activated. State which non-functional requirement will be most important – response rates or portability. All officers will be using issued the same device. Justify your answer.

Question (4 marks)State two different types of constraints that will influence a software solution. Give an example of each constraint.

Link to case study

Question (2 marks)Daniel needs to complete a backup medical records each day. He is trying to decide to back up the data locally or back up the data to the cloud.

Discuss why a local back up would be a better choice.

Question (4 marks)The following criteria are to be used to evaluate the most appropriate design:

• Criterion 1 – The PIMS solution will provide parking tickets in a form that is complete.• Criterion 2 – The PIMS solution user interface must be clear and easy to understand.

Which option – Option A or Option B – should Kirsten choose? Explain why

Steps/procedure/strategy

Question (3 marks)Suggest a strategy that she might use to evaluate the timeliness of the notifications being sent to the parking officers.

Question (3 marks)David backs up all his files to the cloud on a Friday night.

Recommend a procedure David could complete to check if the back-up is completed successfully.

Question (3 marks)Recommend a strategy that could be used to assess the effectiveness of a project plan in managing a project.

U3O1: Programming practice

Data types

Data types include:

Boolean Integer Floating point Character String

Question (4 marks)An example of an animal’s weight is 56.5 kilograms.

Indicate the most appropriate data type for each field.

Chose from integer, floating point, string, character or Boolean

Data structuresA data structure is used to organise and store data

Array Record Associative array

Question (4 marks)Duc needs to store members name, age and phone number in a data structure. Indicate which option would be the most appropriate – an array, record or associative array. Justify your answer.

Design tools

Data dictionary Object descriptors Mock-up diagram Pseudocode

Pseudocode

Question (1 mark)Identify the output of the following procedure

BEGINA ← 1REPEAT

A ← (A * A) + 1UNTIL A > 2PRINT A

END

Question (1 mark)Identify the output of the following procedure

BEGINA ← 4B ← 2REPEAT

A ← A + 1B ← B * 2

UNTIL B > APRINT A, B

END

Question (6 marks)A procedure starts. It sets Variable A to 1 and Variable B to 2. A loop is started. Variable A is doubled andVariable B has 1 added to it. The loop continues until Variable A is bigger than or equal to Variable B. The procedure then stops.

Write this as pseudocode.

Question (3 marks)Complete the following algorithm so that, at its end, the variable largestAge contains the largest number in the 1-D array of integers, ages. The array contains 1000 elements and ages [ 0 ] is not used.

BEGINlargestAge ← 0FOR i ←1 to 1000

ENDFOREND

Question (6 marks)A school stores its Year 12 students’ names and ages in two separate arrays – Names [ ] and Ages [ ].The position of the students’ names in Names [ ] is the same as the position of their ages in Ages [ ].

Write pseudocode to print the names and ages of all students who are 18 or over where the number ofstudents in Year 12 is stored in the variable NoOfStudents.

Question (3 marks)The algorithm below contains five lines, three of which are not shown. Length and Width are variables.Write the next three lines of the algorithm that is needed to swap the contents of Length and Width. You may introduce other variables as needed.

Length ← 5Width ← 7

Question (6 marks)After Election Day, the council needs to prepare a list of those who have not voted. The voters’ electoral roll contains a number of fields, including Surname, GivenName, StreetAddress, Suburb, Postcode and Voted. To do this, it is necessary to read each voter’s details from the Electoral Roll file and display the fields Surname, GivenName, StreetAddress, Suburb and Postcode for those who are recorded as false in the Voted field. Each record is read until the EndOfFile is reached.

Write pseudocode for a procedure to perform this process.

Question 2 (3 marks)The algorithm below contains 12 lines, five of which are not shown.

Competition_Score stores the score each student received in a competition. Two types of certificates are to be printed for students based on their scores. The variable Certificate stores the type of award to be printed.

A high-distinction certificate is printed when a student gets a score between 95 and 100. A pass certificate is printed when a student gets a score between 50 and 94. No certificate is printed if the score is less than 50.

Complete the algorithm to ensure that it functions as expected.

BEGINIF Student in Student Details File THEN

IF Competition_Score >= 50 THEN

ENDIFPRINT “Certificate” Award

ENDIFEND

XML filesXML files are used to organise and transport data between software solutions.

Designed to be easy to read by both people and software.

XML uses tags to give data structure and meaning

<title>Star Wars</title>

Each piece of data is known as an element

Question (3 marks)When a parking officer issues a parking ticket, the following record (in XML format) is sent from the mobile phone application to the council’s fines payments system.

</infringement><?xml version=”1.0” encoding=”UTF-8”?><infringement><reg_pl> </reg_pl><bay_num> </bay_num><park_off> </park_off><c_make> </c_make><c_model> </c_model><c_col> </c_col><reason> </reason><time> </time><date> </date></infringement>

List three fields that the mobile phone application will send to the fines payments system in the XML file.

Question (2 marks)Explain an advantage of an XML file over a plain text file.

Processing features

Instructions Procedures Functions Methods Control structures (sequence, selection and repetition)

Question (2 mark)Explain how a procedure differs from a function.

Question (2 mark)State two control structures used in algorithm.

BEGINFOR i← 1 to 4

Input ScoreTotal ← Total + Score

NEXTAverage = Total / 4PRINT Average

END

SearchesLinearSearches through the array one item at a timeData can be in any order

BinaryChecks the middle valueDivides the array in half until the value is foundData must be sorted first

Question (2 marks)Describe one advantage of both a linear and binary search.

Question (2 marks)What would be the effect on the number of records read (on average) if the total number of records increased from 32 000 to 64 000 (doubled) using

a linear search

a binary search

Internal documentationInternal documentation consists of comments that are made within the code.Internal documentation describes complex sections of code to helps programmers understand the logic

Question (1 mark)State in which stage of the problem-solving methodology is internal documentation completed.

Trace tables

Question (3 marks)Complete the trace table assuming that the test data input was 3, 5, 6, 4 and 78.

BEGINFOR I ← 1 to 5

Input ATotal ← Total + A

NEXTPRINT Total

END

Trace tableVariable Value Value Value Value Value

I

A

Total

U3O2: Analysis and design

Software requirement specification

Functional requirements Non-functional requirements Constraints Scope Use case diagram Data flow diagrams

Question (2 marks)State two functional requirements of the solution

Question (2 marks)Describe what will be contained within the scope of the solution

Alternative design ideas

Question (3 marks)Which option would you recommend? Justify your answer

Use case diagramRepresent the functional elements of a system and how the users of the system interact with the functions

Question (3 marks)The manager of a real estate agency is having new software developed. The software will maintain the information on the system as well as add and remove new rentals. All agents need to be able to add the details of new clients who take up a rental property. Everyone must login.

Complete the use case diagram to show the stated requirements.

Data flow diagrams

Question (4 marks)Sally continues her analysis by drawing a context diagram and she has started a data flowdiagram (DFD).

a. List the entities involved.2 marks

There are three processes:

• Process A – Allocate votes to candidates• Process B – Prepare reports for each candidate• Process C – Check voter eligibility and record votes

From these processes, select the correct two for the circles labelled 1 and 2 in the DFD below.

b. Write your answers in the circles. 2 marks

Efficient and effective user interfaces

Efficiency Effectivenessless time Accuracyless money Completenessless effort Readability

AccessibleAttractivenessRelevanceUsabilityClarity

Question (2 marks)Explain how a drop down list improves the efficiency and effectiveness of data entry.

Naming conventions

Hungarian notation camel Case PascalCase Hump Case

e.g. txtFirstName

Question (2 marks)Describe two features of a naming convention used.

Project management

• Gantt charts • milestones• dependencies• tasks• sequencing• time • resources• ‘critical path’

Question 1 (5 marks)Kirsten plans to set up the parking infringement monitoring system (PIMS). She decides thatbuying the dedicated computer for the council office and the bluetooth printer as well as settingthem up will take four days; writing, testing and debugging the software for the dedicated computerwill take 25 days; writing, testing and debugging the application for the mobile phones will take20 days; and testing the whole system and making sure it works will take seven days.

a. Complete the Gantt chart below to show how the four tasks could be completed within40 days.

4 marks

b. The task ‘test system’ cannot begin until both programming tasks are completed.Show how this situation is represented on the Gantt chart above.

1 mark

Application architecture

MobilePeer to peerRich clientInternet applications

Question (2 marks)Explain how a mobile application differs from a rich client application

U4O1: Software solutions

Access of data on files

Serial and random access Access speeds

Question (2 marks)Susan wishes to download an App for her Smart Phone. The file size of the App is 240MB and the average download speed of Susan’s internet connection is 16Mbps

Calculate the time required to downloaded the app.

Question (3 marks)Management of a Supermarket need to make a decision about whether they need to replace the current file server.

Their current server has a capacity of 250MB and they have 1000 different items of stock. Each stock record needs at 250KB storage space.

Recommend to the Supermarket if they should upgrade their file server. Use calculations to support your answer.

Sorting

Selection sortA selection sort works by identifying the smallest value in the arrayIt then moves the smallest value to the start of the array and then searches for the next smallest value

Quick sortFirst a value is selected as the pivotThen all items are sorted lower or higher than the pivot

Question (1 mark)The following numbers are to be sorted

14, 7, 69, 27, 15, 23, 11, 10

After the 2nd pass, the numbers are in the following order.

7, 10, 69, 27, 15, 23, 11, 14

What type of algorithm was used to sort the array?

Project progress

Three techniques can be used to record the progress of a project

Project log (diary) Annotations Amendments

Question (2 marks)Identify two techniques that could be used to record the progress of a project.

Evaluation

Does the working solution meet the requirements stated in the analysis stage?

An evaluation strategy includes

Criteria A timeline Data needed How the data will be collected?

Question (3 marks)Dan needs to evaluate if his online solution is easy to use.

Outline a strategy that can be used.

U4O2: Interactions and impact

Goals and objective

GoalsGoals are general aimsProvide timely information

ObjectivesObjectives are specific and measureableProvide information in within 60 seconds of a request

Question (2 marks)Below are two aims of a new solution

The new internet application will increase profit The new internet application will increase sales by 10%

State which aim is an information system objective. Give a reason for your answer.

Data integrity

Refers to the quality of the data used within a software solution

Accuracy Timeliness Reasonableness Authenticity Correctness

Question (2 marks)Anita has created an app where members of the public will submit reviews about the surf conditions at beaches around Australia.

Discuss two factors that may affect the integrity of the data submitted.

Key legislation

Laws in Australia set by the government that organisations have to follow including:

Privacy Act 1988 Privacy & Data Protection Act 2014 Health Records Act 2001 Copyright Act 1968 Charter of Human Rights 2006 Spam Act 2003

Question (2 marks)Name a key piece of legislation that affects how organisations communicate their data and information, and provide a specific example of how an organisation can fulfil this requirement.

Data mining

Examining existing large data sets (that where collected for one purpose) to identify any unexpected patterns and relationships within the data (and using this for another purpose).

Question (2 marks)Describe two issues caused by data mining.

Dependent systems

Many information systems get data from other information systems. Problems occur if the data acquired from other systems lacks integrity.

Different systems may have different data types and data structures which causes problems when data is transferred between systems.

Question (2 marks)Below are outputs from two systems of the same data at the same time.

Give a reason why the information provided differs

Threats to data

Accidental Deliberate Event-basedUser error Malware FirePower outage Hackers Lighting strikeHardware failure Data theft Power surge

Security controls

Software PhysicalUsername & password Barrier techniques (locks)Encryption Biometric securityFirewall BackupsSystems protection Shred documentsAccess restrictions Power surge protector

Question (2 marks)Outline a security control used to reduce the chance of a power surge caused by lightning strike.