Computing: Software Development Assessment Contributions towards the study score U3O1 Programming practice SAC 10% U3O2 Analysis & Design SAT 15% U4O1 Software Solutions SAT 15% U4O2 Interactions & Impact SAC 10% Written examination 50% Written examination When & where Thursday 14 th November 2019 3:00pm to 5:15pm Reading Time: 15 minutes Writing Time: 120 minutes Location School should have notified you! Materials Bring Pens & pencils Highlighters & erasers Sharpeners & rulers Calculator – Scientific Watch Don’t Bring Whiteout Dictionary
45
Embed
· Web viewComputing: Software Development. Assessment. Contributions towards the study score. U3O1 Programming practice SAC10% U3O2 Analysis & Design SAT15% U4O1 Software Solutions
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Computing: Software Development
AssessmentContributions towards the study score
U3O1 Programming practice SAC 10%U3O2 Analysis & Design SAT 15%U4O1 Software Solutions SAT 15%U4O2 Interactions & Impact SAC 10%
Section C – Case Study (60 marks)Short and extended-answer questions
Total marks = 100
Timing
120 minutes writing time/ 100 marks
1 mark = 1 minute 12 seconds2 marks = 2 min 24 sec3 marks = 3 min 36 secs4 marks = 4 min 48 sec
Keep an eye on the time!
Reading Time
15 minutes
Read every question carefully – Section A, B, C & Case StudyYou cannot mark the paper in anyway during this timeStart to develop a plan!!!Answer the questions you are confident with first!
Writing Time
You may complete the questions in any orderBegin by answering the questions you feel the most comfortable withGood idea to start with the multiple choiceThis may allow you to be calm, gather your thoughts.
Contents
The exam content will be based upon the study design
2 types of data structures, including one-dimensional arrays (single data type, integer index) and records (varying data types, field index)
3 methods of representing designs, including data dictionaries, object descriptions, mock-ups and pseudocode
4 formatting and structural characteristics of input and output, including XML file formats
5 a programming language as a method for developing working modules that meet specific needs
6 processing features of a programming language, including instructions, procedures, methods, functions and control structures
7 techniques for linear and binary searching
8 techniques for checking that modules meet design specifications, including trace tables and test data
9 purposes and characteristics of internal documentation, including comments and meaningful names.
U3O2: Analysis and design
Don’t know
Know a
little
Know a lot
1Project management concepts and processes, including milestones and dependencies (concepts), and task identification, sequencing, time allocation, resources and documentation using Gantt charts (processes)
2 Techniques for collecting data to determine needs and requirements, including interviews, surveys and observation
3Tools and techniques for depicting the interfaces between solutions, users and networks, including use case diagrams created using Unified Modelling Language
4 Features of context diagrams and data flow diagrams
5 Features of functional and non-functional requirements
6 Constraints that influence solutions, including economic, legal, social, technical and useability factors
7 Factors that determine the scope of solutions
8 Features and purposes of software requirements specifications
9 Techniques for generating design ideas
10 Criteria for evaluating alternative design ideas and the efficiency and effectiveness of solutions
11 Methods of expressing software designs using data dictionaries, object descriptions, mock-ups and pseudocode
12 Factors influencing the design of solutions, including useability, affordability, security, interoperability and marketability
13 Characteristics of user experiences, including efficient and effective user interfaces
14 Naming conventions for solution elements
15 Security considerations influencing the design of solutions, including data protection and authentication
16 Styles of modern application architecture, including mobile, rich client, peer-to-peer and internet applications
17 Types of goals and objectives of organisations and information systems
18 Key legal requirements relating to the ownership and privacy of data and information
U4O1: Software solutions
Don’t know
Know a
little
Know a lot
1 Ways in which file size, storage medium and organisation of files affect access of data.
2 Uses of data structures to organise and manipulate data, including associative arrays (or dictionaries or hash tables).
3 Procedures and techniques for handling and managing files, including security, archiving, backing up and disposing of files.
4 Processing features of a programming language, including instructions, procedures, methods, functions and control structures.
5Algorithms for sorting, including selection sort and quick sort and their suitability for a given purpose, measured in terms of algorithm complexity and sort time.
6 Characteristics of efficient and effective solutions.
7 Techniques for checking that coded solutions meet design specifications, including construction of test data.
8 Validation techniques, including existence checking, range checking and type checking.
9 Techniques for testing the useability of solutions and forms of documenting test results.
10 Techniques for recording the progress of projects, including annotations, adjustments to tasks and timeframes, and logs.
11 Factors that influence the effectiveness of project plans.
12 Strategies for evaluating the efficiency and effectiveness of solutions and project plans.
U4O2: Interactions and impact
Don’t know
Know a little
Know a lot
1 Characteristics of wired and wireless networks
2 Reasons why individuals and organisations use information systems
3 Goals and objectives of information systems
4 Types of interactions (inputs and outputs) generated by information systems
5 Key legislation that affects how organisations control the storage, communication and disposal of their data and information.
6 Characteristics of data that has integrity, including accuracy, timeliness, reasonableness, authenticity, correctness
7Types and causes of accidental, deliberate and events-based threats to the integrity and security of data and information shared between information systems
8 Physical and software controls used by organisations to secure the storage and communication of data in a networked environment
9 Role of hardware, software and technical protocols in managing, controlling and securing data shared between information systems
10 Advantages and disadvantages for stakeholders affected by the operation of information systems
11 The impact of diminished data integrity on dependent systems
12 Tools and techniques for tracing transactions between users of information systems.
13 Data management practices that cause conflict between information systems, including data mining
14 Technical underpinnings of intranets, the internet and virtual private networks
Multiple choice
You need a pencil – and an eraser!Answer questions on multiple choice answer sheetCircle the answer on the question booklet itselfThen colour in the answer sheet
You do not have to complete questions in orderStart with the questions you feel most comfortable withRead each question carefully a number of timesUnderstand what the question is asking?
Underline key words
QuestionA physical control used to prevent unauthorised access to data and information is
A. encryptionB. locks on doorsC. username and passwordD. system protection software
QuestionA procedure checks user input for reasonableness. This type of check is called
A. user acceptance testing.B. evaluation.C. validation.D. testing.
Complete the questions you canThen move onto Sections B & C
Remember to come back to these later!!!
Do not leave any of the multiple choice questions blank
You have at the least a 25% chance of guessing the correct answer
Question 1Testing involves establishing tests and expected results.
At what stage of the problem-solving methodology does testing occur?
A. designB. analysisC. evaluationD. development
Question 2Trace tables are used to test algorithms.
Which of the following best describes the characteristics of a trace table?
A. multi-column, multi-row, shows each variableB. multi-column, multi-row, shows each variable and the result displayedC. multi-column, multi-row, shows actual result, gives evidence of the test workingD. multi-column, multi-row, shows expected result, shows actual result, gives evidence of the test working
Question 3XML describes a set of rules for
A. displaying words in a document.B. inserting pictures into a document.C. designing the layout of a web page.D. formatting data for transferring and storage.
Question 6The Privacy Act 1988 is best described as legislation that outlines how
A. individuals should use personal information.B. organisations should collect and use health records.C. organisations should collect and use personal information.D. organisations should collect and use copyright information.
A. facilitating the streaming of media.B. writing software for wireless devices.C. eliminating dedicated backend servers.D. providing functionality independent of a server.
Question 9An example of an evaluation criterion that measures the efficiency of a software solution is that the software solution should
A. generate accurate output.B. have an intuitive and easy-to-use interface.C. produce the output within a practical time frame.D. produce output that does not require the user to source additional information or perform additionalcalculations.
Question 10Joe has downloaded some information from the internet for his school project. Part of his project is toprovide details of the integrity of his information.
This means Joe must check his information for characteristics including
A. accuracy, effectiveness, security and timeliness.B. accuracy, timeliness, reasonableness and security.C. accuracy, authenticity, timeliness and reasonableness.D. accuracy, authenticity, effectiveness and reasonableness.
Question 12The following numbers are to be sorted in ascending order.
14, 7, 69, 27, 15, 23, 11, 10
After the second pass, the numbers are in the following order.
7, 10, 69, 27, 15, 23, 11, 14
What type of algorithm was used to sort the array?
A. quick sortB. bubble sortC. binary sortD. selection sort
Question 13The following is an example of pseudocode.
WHILE X is not equal to 9Add 1 to X
END WHILE
The lines of pseudocode above are best described as a
A. control structure.B. procedure.C. function.D. method.
Short answer questions
Answer structure
Use the number of marks as a guide to the number of points needed
1 mark = 1 word or sentence2 marks = 2 points or sentences3 marks = 3 points or sentences4 marks = 4 points or sentences
Number of Lines
The number of lines gives an indication of how much to write - you can write more or lessYou can use blank spaceBetter answers tend to be concise
Handwriting
Write as neatly as possible, legible is good! Print if you must.Use ink pen rather than pencilStart each point on a new lineUnderline key words in each sentence
Verbs = Doing Words
For each question identify the action you are expected to take:
Circle the verb or doing word
Question (1 mark)State one control structure used in programming.
Question (2 marks)Give one example of a physical security control. Explain its purpose.
Question (2 marks)Explain the purpose of a software requirement specification (SRS).
Question (3 marks)Aardvark Security requires a solution that will send an alert to a security officer if an alarm is activated. State which non-functional requirement will be most important – response rates or portability. All officers will be using issued the same device. Justify your answer.
Question (4 marks)State two different types of constraints that will influence a software solution. Give an example of each constraint.
Link to case study
Question (2 marks)Daniel needs to complete a backup medical records each day. He is trying to decide to back up the data locally or back up the data to the cloud.
Discuss why a local back up would be a better choice.
Question (4 marks)The following criteria are to be used to evaluate the most appropriate design:
• Criterion 1 – The PIMS solution will provide parking tickets in a form that is complete.• Criterion 2 – The PIMS solution user interface must be clear and easy to understand.
Which option – Option A or Option B – should Kirsten choose? Explain why
Steps/procedure/strategy
Question (3 marks)Suggest a strategy that she might use to evaluate the timeliness of the notifications being sent to the parking officers.
Question (3 marks)David backs up all his files to the cloud on a Friday night.
Recommend a procedure David could complete to check if the back-up is completed successfully.
Question (3 marks)Recommend a strategy that could be used to assess the effectiveness of a project plan in managing a project.
U3O1: Programming practice
Data types
Data types include:
Boolean Integer Floating point Character String
Question (4 marks)An example of an animal’s weight is 56.5 kilograms.
Indicate the most appropriate data type for each field.
Chose from integer, floating point, string, character or Boolean
Data structuresA data structure is used to organise and store data
Array Record Associative array
Question (4 marks)Duc needs to store members name, age and phone number in a data structure. Indicate which option would be the most appropriate – an array, record or associative array. Justify your answer.
Design tools
Data dictionary Object descriptors Mock-up diagram Pseudocode
Pseudocode
Question (1 mark)Identify the output of the following procedure
BEGINA ← 1REPEAT
A ← (A * A) + 1UNTIL A > 2PRINT A
END
Question (1 mark)Identify the output of the following procedure
BEGINA ← 4B ← 2REPEAT
A ← A + 1B ← B * 2
UNTIL B > APRINT A, B
END
Question (6 marks)A procedure starts. It sets Variable A to 1 and Variable B to 2. A loop is started. Variable A is doubled andVariable B has 1 added to it. The loop continues until Variable A is bigger than or equal to Variable B. The procedure then stops.
Write this as pseudocode.
Question (3 marks)Complete the following algorithm so that, at its end, the variable largestAge contains the largest number in the 1-D array of integers, ages. The array contains 1000 elements and ages [ 0 ] is not used.
BEGINlargestAge ← 0FOR i ←1 to 1000
ENDFOREND
Question (6 marks)A school stores its Year 12 students’ names and ages in two separate arrays – Names [ ] and Ages [ ].The position of the students’ names in Names [ ] is the same as the position of their ages in Ages [ ].
Write pseudocode to print the names and ages of all students who are 18 or over where the number ofstudents in Year 12 is stored in the variable NoOfStudents.
Question (3 marks)The algorithm below contains five lines, three of which are not shown. Length and Width are variables.Write the next three lines of the algorithm that is needed to swap the contents of Length and Width. You may introduce other variables as needed.
Length ← 5Width ← 7
Question (6 marks)After Election Day, the council needs to prepare a list of those who have not voted. The voters’ electoral roll contains a number of fields, including Surname, GivenName, StreetAddress, Suburb, Postcode and Voted. To do this, it is necessary to read each voter’s details from the Electoral Roll file and display the fields Surname, GivenName, StreetAddress, Suburb and Postcode for those who are recorded as false in the Voted field. Each record is read until the EndOfFile is reached.
Write pseudocode for a procedure to perform this process.
Question 2 (3 marks)The algorithm below contains 12 lines, five of which are not shown.
Competition_Score stores the score each student received in a competition. Two types of certificates are to be printed for students based on their scores. The variable Certificate stores the type of award to be printed.
A high-distinction certificate is printed when a student gets a score between 95 and 100. A pass certificate is printed when a student gets a score between 50 and 94. No certificate is printed if the score is less than 50.
Complete the algorithm to ensure that it functions as expected.
BEGINIF Student in Student Details File THEN
IF Competition_Score >= 50 THEN
ENDIFPRINT “Certificate” Award
ENDIFEND
XML filesXML files are used to organise and transport data between software solutions.
Designed to be easy to read by both people and software.
XML uses tags to give data structure and meaning
<title>Star Wars</title>
Each piece of data is known as an element
Question (3 marks)When a parking officer issues a parking ticket, the following record (in XML format) is sent from the mobile phone application to the council’s fines payments system.
List three fields that the mobile phone application will send to the fines payments system in the XML file.
Question (2 marks)Explain an advantage of an XML file over a plain text file.
Processing features
Instructions Procedures Functions Methods Control structures (sequence, selection and repetition)
Question (2 mark)Explain how a procedure differs from a function.
Question (2 mark)State two control structures used in algorithm.
BEGINFOR i← 1 to 4
Input ScoreTotal ← Total + Score
NEXTAverage = Total / 4PRINT Average
END
SearchesLinearSearches through the array one item at a timeData can be in any order
BinaryChecks the middle valueDivides the array in half until the value is foundData must be sorted first
Question (2 marks)Describe one advantage of both a linear and binary search.
Question (2 marks)What would be the effect on the number of records read (on average) if the total number of records increased from 32 000 to 64 000 (doubled) using
a linear search
a binary search
Internal documentationInternal documentation consists of comments that are made within the code.Internal documentation describes complex sections of code to helps programmers understand the logic
Question (1 mark)State in which stage of the problem-solving methodology is internal documentation completed.
Trace tables
Question (3 marks)Complete the trace table assuming that the test data input was 3, 5, 6, 4 and 78.
BEGINFOR I ← 1 to 5
Input ATotal ← Total + A
NEXTPRINT Total
END
Trace tableVariable Value Value Value Value Value
I
A
Total
U3O2: Analysis and design
Software requirement specification
Functional requirements Non-functional requirements Constraints Scope Use case diagram Data flow diagrams
Question (2 marks)State two functional requirements of the solution
Question (2 marks)Describe what will be contained within the scope of the solution
Alternative design ideas
Question (3 marks)Which option would you recommend? Justify your answer
Use case diagramRepresent the functional elements of a system and how the users of the system interact with the functions
Question (3 marks)The manager of a real estate agency is having new software developed. The software will maintain the information on the system as well as add and remove new rentals. All agents need to be able to add the details of new clients who take up a rental property. Everyone must login.
Complete the use case diagram to show the stated requirements.
Data flow diagrams
Question (4 marks)Sally continues her analysis by drawing a context diagram and she has started a data flowdiagram (DFD).
a. List the entities involved.2 marks
There are three processes:
• Process A – Allocate votes to candidates• Process B – Prepare reports for each candidate• Process C – Check voter eligibility and record votes
From these processes, select the correct two for the circles labelled 1 and 2 in the DFD below.
b. Write your answers in the circles. 2 marks
Efficient and effective user interfaces
Efficiency Effectivenessless time Accuracyless money Completenessless effort Readability
AccessibleAttractivenessRelevanceUsabilityClarity
Question (2 marks)Explain how a drop down list improves the efficiency and effectiveness of data entry.
Naming conventions
Hungarian notation camel Case PascalCase Hump Case
e.g. txtFirstName
Question (2 marks)Describe two features of a naming convention used.
Question 1 (5 marks)Kirsten plans to set up the parking infringement monitoring system (PIMS). She decides thatbuying the dedicated computer for the council office and the bluetooth printer as well as settingthem up will take four days; writing, testing and debugging the software for the dedicated computerwill take 25 days; writing, testing and debugging the application for the mobile phones will take20 days; and testing the whole system and making sure it works will take seven days.
a. Complete the Gantt chart below to show how the four tasks could be completed within40 days.
4 marks
b. The task ‘test system’ cannot begin until both programming tasks are completed.Show how this situation is represented on the Gantt chart above.
1 mark
Application architecture
MobilePeer to peerRich clientInternet applications
Question (2 marks)Explain how a mobile application differs from a rich client application
U4O1: Software solutions
Access of data on files
Serial and random access Access speeds
Question (2 marks)Susan wishes to download an App for her Smart Phone. The file size of the App is 240MB and the average download speed of Susan’s internet connection is 16Mbps
Calculate the time required to downloaded the app.
Question (3 marks)Management of a Supermarket need to make a decision about whether they need to replace the current file server.
Their current server has a capacity of 250MB and they have 1000 different items of stock. Each stock record needs at 250KB storage space.
Recommend to the Supermarket if they should upgrade their file server. Use calculations to support your answer.
Sorting
Selection sortA selection sort works by identifying the smallest value in the arrayIt then moves the smallest value to the start of the array and then searches for the next smallest value
Quick sortFirst a value is selected as the pivotThen all items are sorted lower or higher than the pivot
Question (1 mark)The following numbers are to be sorted
14, 7, 69, 27, 15, 23, 11, 10
After the 2nd pass, the numbers are in the following order.
7, 10, 69, 27, 15, 23, 11, 14
What type of algorithm was used to sort the array?
Project progress
Three techniques can be used to record the progress of a project
Project log (diary) Annotations Amendments
Question (2 marks)Identify two techniques that could be used to record the progress of a project.
Evaluation
Does the working solution meet the requirements stated in the analysis stage?
An evaluation strategy includes
Criteria A timeline Data needed How the data will be collected?
Question (3 marks)Dan needs to evaluate if his online solution is easy to use.
Outline a strategy that can be used.
U4O2: Interactions and impact
Goals and objective
GoalsGoals are general aimsProvide timely information
ObjectivesObjectives are specific and measureableProvide information in within 60 seconds of a request
Question (2 marks)Below are two aims of a new solution
The new internet application will increase profit The new internet application will increase sales by 10%
State which aim is an information system objective. Give a reason for your answer.
Data integrity
Refers to the quality of the data used within a software solution
Question (2 marks)Anita has created an app where members of the public will submit reviews about the surf conditions at beaches around Australia.
Discuss two factors that may affect the integrity of the data submitted.
Key legislation
Laws in Australia set by the government that organisations have to follow including:
Privacy Act 1988 Privacy & Data Protection Act 2014 Health Records Act 2001 Copyright Act 1968 Charter of Human Rights 2006 Spam Act 2003
Question (2 marks)Name a key piece of legislation that affects how organisations communicate their data and information, and provide a specific example of how an organisation can fulfil this requirement.
Data mining
Examining existing large data sets (that where collected for one purpose) to identify any unexpected patterns and relationships within the data (and using this for another purpose).
Question (2 marks)Describe two issues caused by data mining.
Dependent systems
Many information systems get data from other information systems. Problems occur if the data acquired from other systems lacks integrity.
Different systems may have different data types and data structures which causes problems when data is transferred between systems.
Question (2 marks)Below are outputs from two systems of the same data at the same time.
Give a reason why the information provided differs
Threats to data
Accidental Deliberate Event-basedUser error Malware FirePower outage Hackers Lighting strikeHardware failure Data theft Power surge