Top Banner
1 Briefing Session on 2013 HKDSE ICT Exam 22/23 ov 2013
133

Briefing Session on 2013 HKDSE ICT Exam · 2014. 11. 26. · High correlation with Paper 2s and SBA . 8 . Performance ... for the ICT Curriculum Briefing Session on 2013 HKDSE ICT

Oct 11, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 1

    Briefing Session on

    2013 HKDSE ICT Exam

    22/23 Nov 2013

  • Breakdown of elective

    No. of candidates No. of schools

    1 7,759 490

    2A 862 55

    2B 269 27

    2C 5,607 367

    2D 1,239 104

    2

  • Options offered

    No. of options No. of schools

    1 431

    2 55

    3 4

    4 0

    3

  • Popularity

    Combination No. of schools

    C 314

    D 64

    A 39

    CD 31

    4

  • Interesting Figures (1)

    Paper Max Mark

    1 92

    2A 54

    2B 49

    2C 48

    2D 55

    5

  • Interesting Figures (2)

    Selection of Prog Lang (2D)

    Total %

    Pascal 796 69.1

    C 286 24.8

    Visual Basic 45 3.9

    Java 25 2.2

    1,152 100

    6

  • 7

    Performance – Compulsory Part

    Average no. of MC items correct = 23

    High correlation with Paper 2s and SBA

  • 8

    Performance – Elective Part

    Equating – performance of candidates (Elective Part) can be reflected on the

    same scale (Equipercentile method )

    Performance (Paper 1) of students in

    2D > 2A > 2B > 2C

    Refer to Grading Procedures & standards-referenced

    Reporting in the HKDSE Exam (HKEAA)

  • 9

    Grading Procedures

    Sample script selection

    Standardisation

    Post-marking exercise

    Panel of judges grading meeting

    Internal meeting

    Public Exam Board meeting

    Refer to Grading Procedures & standards-referenced

    Reporting in the HKDSE Exam (HKEAA)

  • ICT (All candidates)

    Level %

    5** 0.7

    5*+ 2.9

    5+ 7.4

    4+ 24.9

    3+ 51.3

    2+ 78.0

    1+ 93.5

    10

  • 11

    Levels attained

    HKDSE Level 4 comparable to

    HKAL Grade D

    L5** Top 10% of L5

    L5*+ Top 40% of L5 (L5* = next 30%)

  • 12

    SBA

    No major irregularity cases

  • 13

    SBA – Reminders

    Students have to

    complete their reports on their own

    acknowledge sources properly in their work

    to avoid plagiarism

    New measures: Prevention & handling

    of Malpractice

  • 14

    2013 ICT Exemplars

    Exemplars with annotated notes

    P1B – 1 exemplar @ Level @ language

    P2 – selected levels

    Uploaded to www.hkeaa.edu.hk

    http://www.hkeaa.edu.hk/

  • Assessing Student Learning

    for the ICT Curriculum

    Briefing Session on 2013

    HKDSE ICT Examination

    [ 1B & 2B ]

  • Paper 1B – Qu 1 ~ (a) (i)

    • John connects the printer to the network at P instead of Q. What is the advantage

    and disadvantage of this? Adv : easy to control

    Disadv : can be used only when the

    desktop computer is on

    Student Performance : OK

  • Paper 1B – Qu 1 ~ (a) (ii) • The printer is equipped with RAM and

    ROM. When John prints a document, what will the RAM and ROM store?

    • Student Performance : RAM: print data

    ROM: printer’s firmware

    – OK, some not know printer has RAM and ROM, and their functions

    • Reflection for T&L: – RAM & ROM are generic main storage, not

    only for computer

  • Paper 1B – Qu 1 ~ (b) (i) • Suggest two possible ways to link up the

    desktop computer and the smartphone.

    • Student Performance : – Good

    WiFi network

    Bluetooth

    USB cable

  • Paper 1B – Qu 1 ~ (b) (ii) • X and Z are two different cables. What is

    the major difference in functional characteristic between them?

    • Student Performance : data transfer rate

    Max. length cable segment

    – Not good, some talk about analog and digital signal

    • Reflection for T&L: – Teach student what is the meaning of

    “functional characteristics”

  • Paper 1B – Qu 1 ~ (c)

    • The rear part of the router is shown in the diagram below. Mark ‘X’ and ‘Y’ on the diagram to indicate where the cables X and Y should be

    connected.

    X LAN

    Y WAN

  • Paper 1B – Qu 1 ~ (d)

    • Someone suggests that John build a Domain Name System (DNS) to improve his network

    services. John disagrees with this suggestion.

    – (i) What network service does a DNS mainly provide?

    – (ii) Do you agree with John’s view? Explain briefly.

    (i) DNS resolves domain names into IP

    (ii) He does not need DNS because it is just a LAN

    • Student Performance :Good

  • Paper 1B – Qu 2 ~ (a)

    • Janice is planning the annual Charity Run for her school. She uses graphics software to create

    a map with the route of the Charity Run and

    posts it on the school’s web site. – Janice decides to store the map as MAP.JPG instead

    of MAP.BMP. Give one benefit of her decision.

    smaller file size/ supported by many browsers

    • Student Performance :Good

  • Paper 1B – Qu 2 ~ (b) •

    • Janice finds that the email client program classifies Alan’s email as spam. What does she

    Suggest two protocols for receiving email that Janice may use

    POP3, IMAP

    need to do to prevent this happening again? Add his email address in non-spam list

    • Janice tries to reply to all the email accounts involved

    • Student Performance :Good Alan and Betty

  • Paper 1B – Qu 2 ~ (c)

    • The notebook computer is equipped with a solid-state drive (SSD) instead of a general hard disk.

    Give two benefits to Janice of using a SSD.

    • higher data transfer rate. • consumes less electricity. • smaller in size. • better shock resistance. • Lighter • more durable.

    • Student Performance : – Good

  • Paper 1B – Qu 2 ~ (c) • Janice uploads the videos and pictures to the

    school’s web site and the web site includes a statement ‘© All rights reserved’. If the statement were removed, would the school own the

    copyright of the web site? Explain briefly.

    Yes, copyright ownership does not

    require any registration or declaration.

  • Paper 1B – Qu 2 ~ (d) (i) • To promote the Charity Run, Janice writes an

    article in the school newsletter and inserts the following code for linking to the school’s web site. Give one advantage of using this code over a bar code.

    • Student Performance :

    • store more data. • a higher error correction capability. • can be scanned in different orientation. be

    made up of more types of data

    – OK, but some show no experience in it

    • Reflection for T&L: – More actual demo to student

  • Paper 1B – Qu 2 ~ (d) (ii) • What is the benefit of using this code in the

    school newsletter?

    • faster to input the URL • reduce typing errors

    • Student Performance : – OK, but some of the answer are too simple (e.g.

    convenience)

    • Reflection for T&L: – More concrete answer, higher level questioning at

    lessons

  • Paper 1B – Qu 2 ~ (d) (iii) • Describe another kind of use of this code.

    phone number / product information.

    • Student Performance : – Good

  • Paper 1B – Qu 3

    • Amy, Billy and Charles work in different offices in a company. Read their conversation about using computers and answer the questions below.

    – Amy: Charles, your office does not have a good ergonomic environment.

    – Billy: Charles, you have installed a Bit Torrent (BT) program on your computer. You should delete it.

    – Charles: No, I will still keep the BT program and use it.

    – Amy: Charles, we installed the same anti-virus software at the same time but only your computer is infected.

  • Paper 1B – Qu 3 ~ (a) • Give two possible features of the setup of

    Charles’ office that could easily lead to eye strain when using the computer.

    improper viewing angle of the monitor /

    improper height of the monitor /

    distance from the monitor to his eyes too close /

    insufficient light /

    close to the window without curtain

    • Student Performance : – Good, but some state features not related to

    set-up, or not related to eye strain

    • Reflection for T&L: – Care about EVERY word in the question

  • Paper 1B – Qu 3 ~ (b) • Billy and Charles have different views on the use

    of the BT program.

    – (i) Give a reason to support Billy’s recommendation.

    – (ii) Give a reason to support Charles’ decision.

    (i) Charles would download some software that the sources come

    from unidentified individual users; the software might be privacy

    copies.

    (ii) Charles can share working files with other colleagues efficiently.

    • Student Performance :OK, but some student think BT is fast / illegal / virus

    • Reflection for T&L: – Clear general misconception of their usual experience

  • Paper 1B – Qu 3 ~ (c) • Why is only Charles’ computer infected?

    Give two possible reasons.

    • Student Performance :

    • infected with new computer virus • deactivates his anti-virus software. • does not regularly update the definition

    database of the anti-virus software.

    – Good, but some state their Anti-virus software are different

    • Reflection for T&L: – Care about EVERY word in the question

  • Paper 1B – Qu 3

    • Charles: The operating system of my computer uses Unicode instead of Big-5 code and GB code.

    • Billy: Unicode only includes around 20,000 Chinese characters.

    • Amy: Not any more. As of September 2012, Unicode includes more than 110,000 characters.

  • Paper 1B – Qu 3 ~ (d) (ii) • Referring to Amy’s comment, do the 110,000

    characters include traditional and simplified

    Chinese characters only? Explain briefly.

    Other than the Chinese characters, there are characters

    of other languages

    • Student Performance : – Good, but some mentioned the following only

    • Number • Character • English character

    • Reflection for T&L: – State more related examples

  • Paper 1B – Qu 3 ~ (d) (i) • To represent a set of 20,000 characters

    using binary code, what is the minimum

    number of bits required? Show your

    calculation. 214 < 20,000 < 215

    15 bits are needed.

    • Student Performance : – Good

  • Paper 1B – Qu 3 ~ (d) (ii) • Referring to Amy’s comment, do the 110,000

    characters include traditional and simplified

    Chinese characters only? Explain briefly.

    Other than the Chinese characters, there are characters

    of other languages

    • Student Performance : – Good, but some mentioned the following only

    • Number • Character • English character

    • Reflection for T&L: – State more related examples

  • Paper 1B – Qu 3

    • Amy, Billy and Charles go to a public library and want to use workstations.

    • Amy: There is an empty seat but the workstation has not been logged out.

    • Charles: The email account has not been logged out. There is a coupon attached to the email. Let me print it

    • so we can use it.

    • Billy: The security of the workstations is very low. Secure Sockets Layer (SSL) should be used.

  • Paper 1B – Qu 3 ~ (e) (i) • Describe two illegal offences that Charles would

    do if he accessed the email and printed the

    coupon. He accesses the email account without authorization. He steals the coupon.

    • Student Performance : – Good, especially in THEFT offences. But some

    mentioned privacy instead of illegal access

    • Reflection for T&L: – A good example to show illegal access vs privacy

  • Paper 1B – Qu 3 ~ (e) (ii) • Can SSL prevent Charles from accessing

    the email account mentioned above? Explain briefly.

    • Student Performance :

    No, SSL is used to secure the data

    transmission. (encryption)

    – Good, except some only mentioned more secure, which is not acceptable

    • Reflection for T&L: – Don’t simply repeat wordings in the question

  • Paper 1B – Qu 4 • Sarah is a librarian in a secondary school.

    She uses a table in a database, LOAN, to

    store the book circulation records.

  • Paper 1B – Qu 4 ~ (a) • Suggest a primary key for LOAN.

    • Suggest a validation check on each of the following fields.

    • Student Performance : – Good, except some not using question example for

    answer reference

    • Reflection for T&L: – Give explanation with reference to question scenario

  • Paper 1B – Qu 4 ~ (b) • Sarah executes a SQL command on

    LOAN with four records, as shown below. SELECT STUID, COUNT(*) FROM LOAN GROUP BY

    STUID

    • Student Performance : – Good

  • Paper 1B – Qu 4 ~ (c) • Sarah wants to send a reminder email to the students

    whose fines total more than $10. She uses column E to store ‘Y’ if the email is needed, and ‘N’ otherwise. She

    enters a formula into E2 and then copies it to the other cells in column E. Write the formula in E2.Suggest a validation check on each of the following fields.

    • Sarah enters the following formula into H3 and then copies it into H4:H5 so as to calculate the sum of all fines in each form. =SUMIF(C2:C160,$G$3, $D$2:$D$160)

    • Student Performance : – Poor, especially in Relative & Absolute Addressing

    • Reflection for T&L: – More effort on Excel Addressing

  • Paper 1B – Qu 4 ~ (d) • Sarah copies the worksheet into a

    document in a word processor by creating

    a dynamic link. For each of the following

    actions, is there any change in the

    worksheet? If yes, describe the change

    • Student Performance : – Good

  • Paper 1B – Qu 4 ~ (e) • Sarah creates a presentation file with

    hyperlinks and multimedia elements and

    posts it on the school’s web site. A student downloads and opens the file. He finds

    some technical problems regarding the

    hyperlinks and multimedia elements.

    Describe two possible technical problems.

    • Student Performance : – Good

  • Paper 1B – Qu 5 ~ (a)

    • Student Performance : – Good, student understand need of

    initialization, and some basic operation

  • Paper 1B – Qu 5 ~ (a)

    • Student Performance : – Not good, some student not good in explaining

    ‘change’

    • Reflection for T&L: – More practice in describing ‘change’

  • Paper 1B – Qu 5 ~ (c) • In this sales promotion, ALG3 is used to

    calculate the actual payment, PAYMENT, for Mary. ALG3 includes ALG1 and ALG2. Complete ALG3.

    • Student Performance : – OK, but some not good in subprogram / modularizing

    the program

    • Reflection for T&L: – More practice in subprogram / modularizing the

    program

  • Paper 1B – Qu 5 ~ (d) • The department store has another sales

    promotion. The 20 members with the highest total spending each month can enjoy 20% off all year round. A computer application system is used to find these 20 members. – Should the system be a single-user system or a

    multi-user system? Explain briefly.

    – Should the system be a batch processing system or a real-time system? Explain briefly.

    • Student Performance : – Good

  • Briefing Session on

    2013 HKDSE ICT Exam Paper 2A

  • Question 1

  • Question 1

    Candidate Performance :

    (a) Very Good. (b) Satisfactory. (c) Satisfactory.

    Most candidates are able to manage simple SQL statements involving filtering,

    ordering and grouping.

    * Accept grouping field(s) is/are not the same as the field(s) in the select clause.

    * Accept TRUE, ‘TRUE’, “TRUE” and .T. to represent boolean data type.

  • Question 1

    Candidate Performance :

    (d) Fair. (e) (i) Fair. (ii) Poor.

    (d) Some candidates cannot handle this more complicated SQL statement. Some of

    them cannot distinguish the usage of “where clause” and “having clause” and put aggregate function in the “where clause”.

    * Not Accept YEAR(…) = “2012” since the return of the function YEAR() is an integer.

    (e)(i) Some candidates directly explain the working flow of this SQL statement, but

    cannot show the background purpose of it.

    (e)(ii) Many candidates don’t know how to use outer join.

    *Accept “left outer join” and “left join” *Not accept … = NULL

  • Question 1

    Candidate Performance :

    (e) (iii) Poor.

    Only a few candidates can answer “MINUS” / “EXCEPT”.

    Some candidates understand this question is asking for combining two SQL

    statements, but they only know the word “UNION”.

  • Question 2

    Candidate Performance :

    (a) Fair.

    Some candidates don’t

    know how to determine

    which is foreign key.

  • Question 2

    Candidate Performance :

    (b) Poor.

    Many candidates don’t know the usage of data dictionary.

  • Question 2

    Candidate Performance :

    (c) Satisfactory

    Many candidates don’t know why SQL View can be used to protect the data privacy.

  • Question 2

    Candidate Performance :

    (d) Satisfactory

    (i) Most candidates can explain the problem, but they don’t know the term “referential integrity” and the concept related to foreign key.

  • Question 3

    Candidate Performance : Fair

    This is a very traditional question, but some candidates still don’t understand the difference of usage between database and spreadsheet

  • Question 3

    Candidate Performance : (b) Excellent

    Some candidate are weak at data representation, e.g. use ‘888’ for an integer.

    * Accept “2013-03-20”,‘2013-03-20’,“20/03/2013”,#20/03/2013#,{20/03/2013} and … * Not Accept 20/03/2013, 20-03-2013

  • Question 3

    Candidate Performance :

    (c) Satisfactory

    Many candidates know this suggestion can reduce the required storage size, but not

    many of them can answer the potential disadvantage with the concept of data

    validation.

  • Question 3

    Candidate Performance :

    (d) Fair

    Most candidates don’t know what should be done before data migration.

  • Question 4

    Candidate Performance :

    (a) Good.

    Some candidates cannot

    identify the job title. Some

    candidates wrongly think

    programmer is responsible for

    designing the conceptual

    database schema.

  • Question 4

    Candidate Performance :

    (b) Good

    * Get 1 mark when one of the entities is correct

    * Get 1 mark when one of the relationship is correct

    * Get 1 mark when one of the cardinality is correct

  • Question 4

    Candidate Performance :

    (c) Satisfactory

    Many candidates can answer both advantage and disadvantage of the combination.

  • Question 4

  • Question 4

    Candidate Performance :

    (d) Satisfactory

    (i) Most candidates know that the system should not disclose the name of buyers.

    (ii) Some candidates only concentrate on the “ordering” and don’t know the “provide proper information” means to protect data privacy. MID should not be selected.

  • Question 4

    Candidate Performance :

    (e) Satisfactory

    The majority of the candidates can answer correct subquery.

    (f) Fair

    Many candidates can answer this question.

  • Paper 2B – Qu 1

  • Paper 2B – Qu 1 (a) • What does the value ‘80’ after the colon in

    the URL mean?

    • Network mask: • Default gateway:

    • Student Performance : – Good, except some wrote 埠 wrongly

    • Reflection for T&L: – More practice in keywords

  • Paper 2B – Qu 1 (b) • function of the gateway • benefit to Vicky of enabling VPN • DHCP is used in the network. How does this

    help the network connection

    • Student Performance : – Poor, especially in VPN and DHCP. Some wrote their

    definition but not benefit

    • Reflection for T&L: – Clear concept between difference of definition vs

    advantage in using

  • Paper 2B – Qu 1 (c) • Suggest two changes in the settings of the

    router which would improve the security

    • Vicky finds that the tablet computer is out of order. She buys a new one which is of the same

    model and uses the same settings as the old

    one. However she cannot connect it to the WiFi

    network. Why? What change in the settings of

    the router should she make?

    • Student Performance : – Good, knowing MAC is unique

  • Paper 2B – Qu 1 (d) • Vicky enables automatic channel selection

    instead of the fixed channels for the router. Why?

    • Student Performance : – Poor, most simply mentioned the benefit is

    “automatics”

    • Reflection for T&L: – Don’t simply repeat wordings in the question

  • Paper 2B – Qu 1 (e) • Vicky has a notebook computer. The

    network supports wired and wireless

    connections. Vicky decides to use the

    wired connection for the notebook

    computer. Apart from bandwidth, suggest

    and describe two reasons to support her

    decision.

    • Student Performance : – Good

  • Paper 2B – Qu 2

  • Paper 2B – Qu 2 (a) • Give an example of the analog data.

    • Give an example of the digital data.

    • Where does the conversion from analog data to digital data take place?

    • Where does the conversion from digital data to analog data take place?

    • Student Performance : – Good

  • Paper 2B – Qu 2 (b) • Briefly describe the data flow in these cameras

    to illustrate the simplex mode.

    • The security system uses synchronous transmission. Give one advantage and one disadvantage of using synchronous transmission.

    • Student Performance : – Poor, cannot well describe

    • Reflection for T&L: – Concept is simple, need more practice in ‘describe’

  • Paper 2B – Qu 2 (c) • Data captured by the cameras is stored on

    the server. Optical fibre instead of CAT5 cable is used for the new cameras but the network throughput does not improve. Give two upgrade suggestions for improving the network throughput

    • Briefly describe the data flow in the new IP cameras, to illustrate the duplex mode.

    • Student Performance : – Good

  • Paper 2B – Qu 2 (d) • In each of the following cases, which protocol,

    UDP or TCP, should be used? Explain briefly.

    – The visual images are sent to a server for storage.

    – Security officers can instantly view the visual images of the lobby.

    • Student Performance : – Poor, cannot well describe

    • Reflection for T&L: – Need more practice in ‘describe’

  • Paper 2B – Qu 3

  • Paper 2B – Qu 3 (a) • Describe two network tests that Mr Chan

    has to do during the testing stage.

    • The museum plans to allow visitors to use their own mobile devices. Give two considerations that the museum should bear in mind before implementing this plan.

    • Student Performance : – Good, students show good ability in design

    test plan if objectives are clear

    – For museum consideration, students answers are too technical

  • Paper 2B – Qu 3 (b)

    • One day, four APs are out of order. – Problem encounter – Relocation ?

    • Student Performance : – Good

  • Paper 2B – Qu 3 (c) • An IT company will donate as many as APs Mr

    Chan wants. Someone suggests that Mr Chan

    should mount more APs, for example, one AP

    every 5 m2. Give two disadvantages of this

    suggestion

    • Student Performance : – Good, except some wrote need budget to buy

    • Reflection for T&L: – Care about EVERY word in the question

  • Paper 2B – Qu 3 (d)

    • Mr Chan needs to install Y instead of network cables for connecting X1 and X2 to the server. Give one reason to explain why network cables should not be used.

    • What major task will X1 perform when interacting with the other five APs in the hall?

    • Student Performance : – Good

  • Paper 2B – Qu 4

  • Paper 2B – Qu 4 (a) • Patients’ medical data is sent from the

    server to doctors’ messaging devices through the hospital’s WiFi network

    instead of the public mobile network. Give

    two reasons to support the use of the WiFi

    network.

    • Student Performance : – Good

  • Paper 2B – Qu 4 (b) • Patients’ medical data collected from the

    medical sensors is sent to doctors’

    messaging devices via the server. What

    are the major functions of the server

    regarding network management? Give

    two examples.

    • Student Performance : – Good

  • Paper 2B – Qu 4 (c) • Packet switching is used for the data

    transmission between the server and doctors’ messaging devices. – Circuit switching should not be used in this case. Why

    not?

    – Describe the packet switching mechanism for the data transmission.

    • Student Performance : – Poor, cannot well describe, and also not clear in

    packet vs circuit switching

    • Reflection for T&L: – Need more practice in ‘describe’, and more teaching

    in packet vs circuit switching

  • Paper 2B – Qu 4 (d) • The network design uses Cloud storage,

    that is, online storage managed by third

    parties through the Internet.

    – Give two benefits of using Cloud storage

    – Give two potential problems of using Cloud storage.

    • Student Performance : – Good

  • Paper 2B – Qu 4 (e) • The bedside device is a mobile device which

    allows a patient to move around the hospital with

    the device. It forms a personal area network

    (PAN) with medical sensors for communication,

    as shown below.

    • Student Performance : – Poor, student not have good knowledge in PAN

    • Reflection for T&L: – Need more teaching in PAN

  • 2013 ICT Paper 2C

  • • 毋須安裝/ 可利用瀏覽器觀看電影/跨平台(附註解)

    下載、串流傳輸、網上觀看

    • 容易發放更新版本/跨平台(附註解)

    有效管理客戶或電影記錄 / 防止電影被下載

  • 兼容很多常用視像放器。 / 毋須額外Codec。/ 質量較佳(需要較少壓縮)

    毋須Codec。

    檔案較大。/不支援串流傳輸。

  • 較短等候時間

    節省時間

    (硬件)圖形顯示卡的運算能力差。/

    沒有足夠記憶體。

    沒有更新、不夠好

    (網絡)顧客電腦的網絡頻寬不足。/

    伺服器因繁忙未及回應。/

    網絡十分繁忙。

  • 60 ×1024 × 1024 × 8 / 200 或 60 × 8 / 200

    = 2516582.4 bit/s 或 2.4 Mbps (2.5Mbps)

  • MP4 / MKV / AVI (H264, AVCHD) / WMV / FLV / MOV (, )

    codec, FFmpeg, DivX, Xvid, x264, mpeg

  • 每秒掃瞄行數 (高度 )

    解像度、每秒掃瞄像素數目 / 幀數目、像素寬度

    在逐行視像中,幀內所有行線逐行更新。

    逐行更新

    在交錯視像中,幀內所有行線隔行更新。

    一個一個(層)改變

  • Q.2

    是 否

    是 是

    否 否

  • 這兩個瀏覽器對某些HTML 編碼的翻譯不同。/

    這兩個瀏覽器於墊或邊界的設定不同。

    表格 / 幀 (frame) / CSS / 圖像 / 層面 (layer) (, )

  • 搜尋器加入搜尋索引時採用這些數據。 / 彼得打算增加被搜尋器搜尋得到的機會。/ 定義字符編碼格式。

    網頁 / 關鍵字 / 標題 / 作者 / 版權 / 產生日期 / 字符編碼 / 網頁更新 / 轉發 (, )

    (附描述)

    (其他可行用途)

  • 5184 3456 24 位元

    = 51 / 51.3 / 51.26 MB

    幀速率 / 解像度 / 檔案格式 / 過渡效果 /

    音效 / 字幕 (, , )

  • HKDSE ICT Paper 2C Q.3 - 4

  • 防止傀儡程式讀取這些文字。/確保這項回應是由真人發出。/防止註冊或輸入資料由軟件自動產生。 (防止點客攻擊/防止複製及貼上 )

  • 它可由布拉耶 / 布萊葉閱讀器 / 讀屏軟件讀取。 (盲人可使用替換文字 )

    透過聲效讀出驗證碼內容。 (聲效驗證 )

  • (電腦 /瀏覽器 )

    向用戶名稱(或其他輸入欄)採用客戶端手稿程式(本機 / JavaScript),(1)以檢測其輸入是否空白 (+1)。向用戶名稱(或其他輸入欄)採用伺服器端手稿程式(數據庫), (1)以檢驗客戶的真確性 /使用者名稱與密碼是否有效 (+1)。

  • 缺點1:用戶可沒有正確輸入歌曲的代碼。 (1)方案1:當按下表單上的歌曲時將代碼自動加入。/在每一行歌上加入一個「加入購物籃」按鈕。/在歌曲側加入一個複選框。 (+1) (利用下拉式選單 )

    缺點2:用戶所揀選的歌曲沒有顯示,他不能刪除或修改。/用戶未能檢視所選購的歌曲。 (1)方案2:加入一個表格來展示所揀選的歌曲,並容許作任何修改。(+1) (加入一個重設/復原按鈕 )

    其他可行答案:歌曲不是順序排列 (1)加入一項排序功能/搜尋功能 (+1)

  • (缺點:用戶每次只可輸入一個代碼。 /該文字欄太短。 /「繼續購買」按鈕沒有用處。/用戶每次只可購買一首歌曲。 /不能自動運算總金額。

    只有歌曲名稱,不清楚由那個歌手唱

    方案:加入一個數量欄。 /加入一個歌手欄。 /加入試聽連結 )

  • 在一秒內取出 44,100個樣本。 (44.1 1024 )

    每個樣本由 16個位元數據組成。/每個樣本大小為16個位元。

    它可產生從四方收集的聲音,如自然發出的聲音,富人性化。/利用兩個聲道(左右兩邊)收錄聲音。可播放出栩栩如生的歌曲。/錄播的歌曲接近真人現場演唱。

    (質量較佳/聲音佳/清晰地收錄聲音/有兩道聲道 )

  • 相位 phase振幅 Amplitude / 聲量 loudness / volume

    (檔案類型/檔案格式/壓縮方法/時段/長度 )

  • 有一些活動的名稱冗長,它們可清楚地展示出來。/寬度/顯示面積較細,適合於手提電話/流動裝置使用。 (2)

    當有很多不同活動時,此項設計可固定所展示活動清單的長度,以供選擇。/所選擇的活動可清楚地展示。 (2)

    顯示一對話框來確認有關選擇。 (1)

  • 加入一個「取消勾選」/「重設」按鈕, (1)取消所選擇的項目,讓用戶可簡單地重新選擇。/減少重新載入此網頁的時間。 (+1)

  • 2013 HKDSE ICT-D workshop

    2013-11-22 2013-11-23

  • Q1

  • Q1

  • Q1

  • Q1

  • Q2

  • Q2

  • Q2

  • Q2

  • Q3

  • Q3

  • Q3

  • Q3

  • Q4

  • Q4

  • Q4

  • Q4