view_agenda
Questions
Find the perfect question by filtering through every previous QCAA Digital Solutions external exam question
notifications
Question Classifications
We’re conducting a final review of the classifications and formatting for our recently onboarded questions. If you have any feedback, please share it with us here.
QUESTION 3 This data dictionary is for a table containing data on basketball players in a professional league. Table: players Column name Data type playernumber VARCHAR es playerheight INTEGER Primary key? Length playername TEXT teamname VARCHAR Yes The following SQL query returned an error on execution: INSERT INTO players (teamname playernumber VALUES ('Raptors' '2' ‘Edward Lee' 183.5); Which column needs to be adjusted for the query to work? (A) playernumber (B) playerheight (C) playername (D) teamname playername < I) 10 playerheight)
QUESTION 8 A soccer club needs to develop a system for storing members’ data including: name address team membership type email address phone number. The secretary wants to email weekly newsletters to members. The treasurer wants to print membership lists and store yearly payment information. To produce this system the developer will need to generate a database design interfaces and develop coded modules to send emails. After adding and updating member details they will also need to (A) generate reports and process payments. (B) generate reports and provide secure logins for users. (C) process payments and provide secure logins for users. (D) generate reports process payments and provide secure logins for users.
QUESTION 9 The table describes a sample of the personalised numberplate range for Queensland. Range Classic Emoji 3 alphabetic characters and 1 emoji Combination of 3 numeric characters and Combination of 5 alphanumeric characters Which SQL statement is correct for ordering a new personalised numberplate? (A) CREATE TABLE orders product range = ‘classic theme’ combination = ‘YIP333’ customerId = 123; (B) INSERT INTO orders (customerId product range combination) VALUES (123 ‘classic theme’ ‘YIP333’) (C) UPDATE orders SET product range = ‘classic theme’ combination = ‘YIP333’ WHERE customerlId = 123; (D) ALTER TABLE orders SET product range = ‘classic theme’ combination WHERE customerld = 123; *YIP333’
QUESTION 9 This table contains the posts published to a rock climbing group on a social networking site. Table: posts 15/06/2019 Would anyone like to rock climb tomorrow? ae 15/06/2019 Lui Chan Who is going to the boulder festival? 14/06/2019 Lui Chan Who wants to go to yoga tonight? 14/06/2019 Amy Smith Has anyone picked up a chalk bag? > An SQL query is executed: SELECT Date Author SUM(Likes) FROM Posts GROUP BY Date Author What is the output of this query? SUMiTibe 15/06/2019 Lui Chan Would anyone like to rock climb tomorrow? 20 | 14/06/2019 Lui Chan Who wants to go to yoga tonight? To 14/06/2019 Amy Smith Has anyone picked up a chalk bag? 9 | (B) Author SUM(Likes) 15/06/2019 | Lui Chan 27 14/06/2019 Amy Smith 9 14/06/2019 Lui Chan ‘seer | o) SUMITiRES (C) SUM(Likes) 14/06/2019 Amy Smith 9 |
QUESTION 7 An application accesses an API that obtains data relating to books read by users. The data that needs to be stored locally includes: * one or more images of each book’s cover ¢ book recommendation notes * acomment on each book. Book data is located using the ISBN — a unique identifier for each published book. When searching for a book the returned JSON data is outputted: { vyolumeInfo :{ title : Designing Relational Databases subtitle : A beginner’s guide authors : [ Joan Janson Katy Pratt l isbn : 1440569239562 Books Ltd 2016-05 publisher : publishedDate : pageCount :367 imageLinks ™: { smallThumbnail : http://books.abcd.com/books?id=jedfoYprny465&éimage=l&source=gbs _ api thumbnail : http://books.abcd.com/books?id=jedfoYprny465éimage=3&source=gbs api } } What is the most appropriate method to store the data in local tables so it can be easily retrieved for display? (A) ISBN pages authors comment recommendation (B) ISBN il © Boolean comments recommendation image link comments recommendation (0) Text Text Text comments recommendation publisher published date Table: images Jpg Integer image_link ISBN Table: authors Text Text Table: authors Table: authors
QUESTION 1 Asymmetric encryption algorithms (A) all use one key. (B) only use private keys. (C) havea block size of 64. (D) use different keys for encryption and decryption.
QUESTION 5 A business uses an online form to collect information about its customers. A customer has entered their tax file number in a comment area even though they were not required to provide this information. To comply with the Australian Privacy Principles (2014) the business should (A) encrypt this data. (B) delete this data immediately. (C) notify the customer that the data has been received. (D) notify the tax department that a data breach has occurred.
QUESTION 6 Desk check the algorithm to predict the output for numX = 8 and numZ = 5. BEGIN SET numX user input SET numZ user input IF numxX < 10 AND numZ > 10 THEN OUTPUT “Condition 1” ELSE numX > 5 OR numZ < 5 THEN OUTPUT “Condition 2” ELSE numX > 5 OR numZ < 10 THEN OUTPUT “Condition 3” ELSE OUTPUT “Condition 4” ENDIF END (A) Condition 1 (B) Condition 2 (C) Condition 3 (D) Condition 4
QUESTION 1 Converting a variable-length set of data to a fixed-length hexadecimal value is known as (A) hashing. (B) checksum. (C) encryption. (D) authentication.
QUESTION 6 This algorithm determines the total points a player receives from rolling a standard six-sided dice three times. BEGIN SET points = 0 SET count = 0 REPEAT SET result = random number between 1 and 6 inclusive (roll die) SET number on die as result IF result = 1 THEN points = points + 100 ELSE IF result = 5 points = points + 50 ENDIF ENDIF INCREMENT count UNTIL count = 3 END How many points will a player receive if they roll a 2 then a 3 followed by a 5? (A) 50 (B) 100 (C) 150 (D) 200
QUESTION 10 Which solution requirements help protect the integrity of customer order data when ordering online? (A) (B) (C) (D) Customers can only track their own parcels. Customers can track parcels using a parcel ID. All delivery messages contain a valid checksum. All delivery messages contain a valid hash function.
QUESTION 10 In a game scores are averaged for players in the same team. Each team consists of five players. Player names and scores are to be stored in arrays. The referee was given the first version of the algorithm which they then improved to create the second version. First version Second version ProcessGroup (name[] score[]) ProcessGroup (name[] score[]) BEGIN BEGIN SET total = 0 SET groupSize = 5 PRINT name[1] SET count = 0 CALCULATE total SET total = 0 PRINT name[2] WHILE count < groupSize CALCULATE total PRINT name[count] PRINT name[3] CALCULATE total = total + score[count] CALCULATE total INCREMENT count PRINT name[4] ENDWHILE CALCULATE total CALCULATE average = total / groupSize PRINT name[5] PRINT average CALCULATE total total + END CALCULATE average = total PRINT average END Which features of good algorithms have been improved in the second version? (A) efficiency effectiveness (B) reliability effectiveness (C) maintainability efficiency (D)_ reliability maintainability
QUESTION 6 Complete the Caesar encryption algorithm with the correct statement at line 5. O BEGIN it INPUT userText AS STRING 2 INPUT userShift AS INTEGER 3 4 FOR each character IN userText 5 6 result = result + newCharacter 7 ENDFOR 8 OUTPUT result 9 END (A) newCharacter = userText + userShift (B) newCharacter = character + userShift (C) newCharacter = character - userShift (D) newCharacter = character + userShift MOD 26
QUESTION 8 Analyse the user interface to determine a visible risk that affects the data security of the webpage owner. € > C | QO http:/www.example.com Downloads @ Filename.docx Pop-up advertisement C) Filename.pdf () Filename.exe gO @ Filename.app CLICK HERE () Filename.mov C) Filename.mp4 Email address* (A) The user interface has pop-up advertising. (B) The user interface hosts several documents for download. (C) The user interface requires user input of personal information. (D) The user interface uses the HTTP network transmission protocol.
QUESTION 7 Which data format supports structures including strings arrays numbers and Booleans in UTF-8 encoding? (A) SQL (B) XML (C) JSON (D) HTML
QUESTION 10 Desk check the algorithm to determine its output. BEGIN 6 SET Y = 12 SET X WHILE (X < Y) INCREMENT X Y = PROCESS1(X Y) ENDWHILE OUTPUT Y END BEGIN PROCESS1 (A B) CALCULATE C = (B — A) x 2 RETURN C END PROCESS1 The output value is (A) -10 (B) 4 (C) 8 (D) 10
QUESTION 1 Hashing increases security for data (A) storage. (B) encryption. (C) compression. (D) authentication.
QUESTION 14 (21 marks) Two novice programmers who live in different locations want to develop a method for securing their email communication. They have decided to: 1. meetin the same location 2. use a generic code library that contains functions relating to a set of cryptology algorithms called ‘Blowfish’ use only UTF-8 data encoding e.g. the character ‘%’ is considered to have a length of 8 bits in total create their own programs using different languages generate encrypted text using their programs Nw & copy and paste encrypted text into their emails. Blowfish key expansion Blowfish crypt BlowfishInitiate (key) Blowfish(Value KeySet Process-Type) Purpose Completes the initial key expansion | Completes the block algorithm process for processes. encryption or decryption. Returns a data structure called Accepts a 64-bit—length set of values in the form Blowfish KeySets. of text along with the pre-processed Blowfish KeySets. Inputs Key: text-based 64-bit in length Value: text-based 64-bit in length KeySet: returned data structure from the BlowfishInitiate function Process-Type: 1 for encrypt 2 for decrypt KeySet Text-based value BlowfishInitiate( J$8%*S#d ) | Blowfish( abcdefg MyKeySet 1) Note: If any input does not meet a function’s length requirements the function will fail and potentially cause a runtime error. a) Symbolise an algorithm that the programmers could use to encrypt their Unicode set of text. The algorithm should use the function library calls in the table as required. [6 marks] b) The programmers make the solution publicly available on their website as a web application. Explain and justify how they could implement two useability principles to optimise user experience. [6 marks] c) Evaluate whether the programmers have developed the most secure method to encrypt an email message by identifying two strengths and two weaknesses in the steps. Support all statements with examples. Provide two recommendations and justify how each recommendation would improve security. [9 marks]
QUESTION 9 Which algorithmic statement determines the value of y between 10 and 50 inclusive? (A) IF 10 > y OR y > 50 (B) IF 10 > y AND y < 50 (C) IF y >= 10 OR y <= 50 (D) IF y >= 10 AND y <= 50
QUESTION 11 (2 marks) Explain the features of two network transmission protocols for transferring data between websites.
QUESTION 13 (12 marks) A games arcade has developed a digital solution for recording members’ points. Members receive a membership card which they scan when they play games at the arcade. The card records how many points a member receives from winning a game. A sample of the data is shown. memes CS members_activity Ee a) Develop an algorithm to list all members by name. Sort the list alphabetically by last name. [4 marks] b) Develop an algorithm to list member IDs and join dates for memberships of 10 or more years. Sort the list by join date in ascending order. [4 marks] c) Develop an algorithm to provide the contact details for members who currently have more than 3000 points. [4 marks]
QUESTION 5 Analyse the flow of data to identify the appropriate data security strategy to be performed at Z. Login details ; or Users —— Confirmation or rejection Username + Doctors passwond = + Confirmation or rejection Authenticated user details | Enter medical . . Patient medical Patient medical records —> records records (A) authentication (B) checksum (C) hashing (D) encryption
QUESTION 11 (13 marks) Business owners use an online platform to sell products. The essential features of the platform are listed. Platform: ¢ allows customers and business owners to register and log in ¢ has four data stores (customer data products shopping cart and orders) * processes order payments ¢ confirms orders with customers and business owners after successful payment. Customers: * register an account ¢ select products that appear in the shopping cart * may continue shopping after viewing the shopping cart. Business owners: * access confirmed orders * access customer account details ¢ update products and prices. Symbolise data flow for this system using a diagram that includes all essential features listed.
QUESTION 13 (5 marks) In an online silent auction items are posted on a public website and participants post a secret bid on the items they would like to purchase. Bidders cannot see each other’s bids. The bidding period is 7 consecutive days. At the end of the auction all bid values are revealed on the website and the highest bidder pays the amount they posted to obtain the item. a) Explain how checksums encryption and authentication would improve the security of the data exchange in this scenario. [3 marks] b) Recommend one encryption method to securely store auction data and justify your response. [2 marks]
QUESTION 11 (21 marks) The diagram shows the user interface for a drone control panel. Heading ‘ 200 m/hr Altitude Temperature mz C™AM —200 m/hr °C a) Explain how three elements and three principles of visual communication (excluding colour) have been used. [12 marks] b) Further develop the user interface to include five new features: camera views for Cameras | and 2 and readings for speed battery power and flight angle. [5 marks] c) Use four elements and principles of visual communication to justify in annotations on your diagram in 11b) the placement and visual appearance of the five new features of the user interface. [4 marks]
QUESTION 12 (18 marks) A mobile application (app) allows car owners to remotely unlock their cars if they lock the keys inside or their keys malfunction. Once users have created an account they can request a remote unlock by entering their username and password. The user data that is required to set up an account includes: full name date of birth home address driver licence number vehicle make model and colour vehicle registration. a) Analyse the information and evaluate risks to data confidentiality integrity and availability for this app. Justify your response with three examples. b) Identify a relevant Australian Privacy Principle and explain an ethical consideration when using app data. Australian Privacy Principle: Ethical consideration: c) You discover that the app uses a Caesar cipher to encrypt data allowing you to intercept a password in transit. Perform a desk check for five iterations to decrypt the password ‘KY IWW’. d) A friend is interested in learning more about encryption. Use pseudocode to symbolise a simple Caesar cipher as a demonstration. [6 marks] [2 marks] [2 marks] [8 marks]
QUESTION 12 (8 marks) Marine markers are placed throughout Queensland waterways. Each marine marker is fitted with an Internet of Things (IoT) device that can broadcast a fault status via a satellite internet link. Each day the IoT device checks the status of the marker. If a fault is detected the device broadcasts the marker’s unique identifier a positive fault status flag and the fault occurrence date and time. This is an example data structure provided by a marine marker’s IoI device: { OldMarineMarkerId : 3446 OldMarineMarkerFault : True OldMarineMarkerDateTime : 2020-02-02T18:00:00.0002 } A request has been made for a quarterly release of an ongoing summary of fault issues per area. The information will be centrally stored in this way: MarineMarkerStatus [MarkerID MarkerType AreaDescription Latitude Longitude Fault Detected] gD eee Ne ) vy ZFS —1G \ SW (Ss TS= a) Evaluate the proposed solution against the criteria of reliability and accuracy. [2 marks] Reliability: Accuracy: b) State two additional criteria and evaluate the proposed solution against these criteria. [4 marks] Criterion: Criterion: c) Justify why JSON is an effective method of data exchange between the marine markers and the central database system. Provide two reasons to justify your response. [2 marks]
QUESTION 13 (12 marks) Refer to Stimulus 2 in the stimulus book. a) b) Use pseudocode to symbolise a one-time pad encryption algorithm with any lower case letters. Users must input the plain text and key. [7 marks] Evaluate the encryption algorithm developed in Question 13a) by performing a desk check. Use the plain text and key provided. Specify all inputs and outputs in table form. Plain text: Queens Key: ryjwah Example output: hsnanz [5 marks]
QUESTION 15 (17 marks) Refer to Stimulus 2 in the stimulus book. Stimulus 2 is an extract from a university course database that shows enrolled students assessment items and student results for each assessment item. The following query was developed to show all students (by ID) and their overall subject result. SELECT ID SUM (Mark / 100) FROM Results Assess GROUP BY Item a) Evaluate the query and identify and describe any errors. [6 marks] b) Refine the query to ensure it functions correctly. Justify the refinements made. [7 marks] c) Refine the query in 15b) to show only students with a subject rank of ‘A’. [4 marks]
QUESTION 14 (6 marks) Refer to Stimulus 3 in the stimulus book. A secondary school stores encrypted student results in a database. To access their results students must log in using their student ID and password. Login details are checked against the database to ensure only authorised students can gain access. Passwords are encrypted for added security. Once logged in students must enter a public decryption key to have their results displayed. The database contains overall results for all subjects and students. Only results linked to the relevant student ID are displayed; students cannot view other students’ results. The algorithm for this system is incomplete. Complete the algorithm using the supplied code library. BEGIN GET studentID from input form GET password from input form GET key from input form
QUESTION 16 (24 marks) In security systems it is common practice to use a unique identifier of a numeric type for example a door lock code or PIN. People often store these numbers in an unsecured text file on personal devices. A simple encryption method for a two-digit number is shown below. é $ % A & * ( ) 3 4 5 6 7 718 8}19 of} 0 Plaintext Block key Encrypted Ciphertext number number character '4Q! 1 7 3 9 55 8 2 0 4 6 5 % 5! 12 3 4 5 6 7 8 9 0 6 “ Therefore the Plaintext number '45 ' would output Ciphertext '%*'. a) Develop a low-fidelity prototype solution key for any four-digit PIN (e.g. 7826) with associated key and predicted output. The algorithm must read data from a user input and output encrypted data to a file. Annotate the pseudocode in the table below to identify the location of assignment condition and modularisation. Evaluate the algorithm using a desk check and write the output at each step. [18 marks] Original Key Encrypted number Character b) Compare this encryption method with a standard Caesar cipher explaining three advantages and/or disadvantages of each method. Explain which of these two methods is the more secure method to use and justify your response. [6 marks]
QUESTION 12 (8 marks) Refer to Stimulus | in the stimulus book. a) Describe the listed algorithm constructs and identify one example of each from the stimulus. Use corresponding line numbers to identify examples. [6 marks] Assignment: Example: Condition: Example: Iteration: Example: b) Explain the purpose of modularisation and identify an example of how it is used in the stimulus. Use corresponding line numbers in your response. [2 marks]
QUESTION 11 (6 marks) Describe two elements of visual communication that can be implemented to enhance the user experience.
QUESTION 9 The following extract from a medical database shows patients vaccines by item number date vaccination is due date immunised and the risk of contracting the disease post-immunisation. Patients ID First 1684 John 2893 Mary 3642 Jackie 1206 Michael 1910 Midori 1934 Beatrice 1935 Wanda Assess Item Vaccine 1 Measles 2 Polio 3 Tetanus SELECT first FROM results r INNER JOIN assess a ON r.item = INNER JOIN patients p ON p.id = WHERE a.item in AND r.immunised < a.due ; Last Jones Smith Joyce Mentos Ono Thompson Granger Risk 0.001 0.00021 0.0005 last (1 2) The query above determines (A) (B) (C) (D) Due 1990-09-08 1990-10-21 1990-12-02 immunised Results Item \ DO Ww W W WwW W NY NHN NY KN WN a.item r.id ID 1684 2893 1206 1934 1935 3642 1684 3642 1934 2893 1935 3642 1934 2893 1935 1684 1206 Immunised 1990-09-08 1990-09-07 1990-09-08 1990-09-10 1990-09-06 1990-09-09 1990-10-21 1990-10-22 1990-10-21 1990-10-22 1990-10-21 1990-12-10 1990-12-08 1990-11-30 1990-11-30 1990-12-07 1990-12-11 Risk -001 .00021 .0005 .001 .0005 .00021 .0005 001 .0005 .0006 .00021 .0007 .O01 .0014 .00021 O01 004 o.UlUCOOlmlCO CO COT CT i TT i TT Tt Tt Tt TT Tt Tt lc Tt lO the first name last name and immunisation date for all patients who received items before they were due. the first name last name and immunisation date for patients who received Items | and 2 after they were due. the first name last name and immunisation date for patients who received Item | or Item 2 before it was due. the first name last name and immunisation date for patients who received Items 1 and 2 before they were due.
QUESTION 6 The following algorithm produces an output from input data. Main program BEGIN varl = 4 var3 = 3 process3() process2 (var3) processl () END Sub processl () BEGIN PRINT varl + 4 Sub END Sub process2 (var2) BEGIN PRINT 4 + var2 Sub END Sub process3 () BEGIN PRINT var3 / 3 Sub END The output of the pseudocode will be (A) 1744. (B) 1544. (C) 178. (D) 158.
QUESTION 10 The two algorithms below are for the ‘fizzbuzz’ test. The algorithms evaluate numbers between | and 100 and print: e ‘fizz’ if the number is a factor of 3 OR e ‘buzz’ if the number is a factor of 5 OR e ‘fizzbuzz’ if the number is a factor of both 3 and 5 OR e the original number if the number is a factor of neither 3 nor 5. Algorithm 1 Algorithm 2 BEGIN BEGIN i=] FOR i = 1 to 100 WHITE i <= 100 IF i modulus 3 = 0 IF i modulus 3 = 0 PRINT fizz PRINT ©1122 ENDIF ENDIF IF i modulus 5 = 0 IF i modulus 5 = 0 PRINT buzz ENDIF PRINT buzz IF NOT i modulus 3 = 0 ENDIF AND NOT i modulus 5 = 0 . . PRINT i IF i modulus 5 = 0 and i PRINT new line modulus 3 = 0 tj=-id¢il PRINT fizzbuzz ENDIF ENDWHILE ELSE . END PRINT 1 ENDIF PRINT new line NEXT END The algorithms were evaluated against the criteria of accuracy and reliability. Examine the algorithms and choose the statement that is true. (A) Algorithm | is more reliable than Algorithm 2. (B) Algorithm 2 is more reliable than Algorithm 1. (C) Algorithm | is more accurate than Algorithm 2. (D) Algorithm 2 is more accurate than Algorithm 1.
QUESTION 5 JSON uses human-readable text to transmit data objects. { name : John } { age :30 } { employees : [ John Anna Peter ]} { sale :true } The JSON data types in the code above would be declared as (A) John 30 John Sale. (B) name age employees sale. (C) char number list true/false. (D) string integer array of strings Boolean.
QUESTION 14 (13 marks) Use pseudocode to write an algorithm to determine whether a word contains two consecutive letters that are the same. Examples of words that contain two consecutive letters that are the same are ‘ball’ ‘moon’ and ‘possible’.
QUESTION 13 (18 marks) A medical practice is developing a system for their patient bookings and record keeping. A centralised database store will be implemented with access available from several medical practices across the city. The system will contain a variety of non-encrypted patient information (e.g. names and contact details) patient bookings encrypted patient medical records and doctor information. Doctors will be able to enter and edit all data but not bookings. Employees of each practice will be able to enter and edit patient information and bookings but not medical records. Patients will be able to enter and update their own patient information and enter and view their own bookings. a) Symbolise the practice’s networked database requirements in a high-level data flow diagram. The data flow diagram has been started for you below. [10 marks] Create/edit doctors Update patient details Bookings Create/edit medical records b) Explain two key security features required in this system and justify why you would include them. [8 marks]
QUESTION 8 Examine the following data flow diagram for a business that makes and sells widgets. Customer order Sales forecast Product ordered Product served . Production schedule Customer Production Employee Inventory Payment (3s Purchase order Order decisions Vendor Procurement Received goods Time worked Payroll From the diagram which of the following statements is most correct? (A) Production receives input based on other processes and entities. (B) This business consists of four main processes and three entities. (C) The sale process receives input from multiple sources. (D) Employees provide information to support the sale.
QUESTION 12 (17 marks) Refer to Stimulus | in the stimulus book. Pseudocode has been developed for a two-player ‘guess the number’ game. The game is played when: e Player | inputs a number ranging from and including 1 to 10 e Player 2 attempts to guess the number entered by Player |. Player 2 has three attempts to guess the correct number. a) The pseudocode contains errors. Analyse the pseudocode to identify and explain each error. Using the same variables make refinements to the pseudocode to correct the identified errors. [9 marks] b) Desk check your corrected algorithm by completing the test table below. Include any WRITE statements that are generated during testing. Assume Player | inputs the number 5 Player 2 is not able to correctly guess the answer during any of their attempts and all Player 2 inputs are valid. Player 1 | Loop Guess Value of input ‘Correct’ at Line 21 [S marks]
QUESTION 6 Which statement correctly describes the relationship between JSON and REST? (A) Both JSON and REST are formats used to exchange data. (B) JSON uses JavaScript object notation and REST uses XML. (C) JSON is a format used to exchange data through REST architecture. (D) JSON refers to the client side and REST refers to the server side of a data exchange.
QUESTION 4 The table below shows two algorithms. Program 1 Program 2 BEGIN Main numl = 50 Sub () PRINT numl END Main BEGIN Sub numl is local numl = 20 END Sub BEGIN Main numl is global numl = 50 Sub () PRINT numl END Main BEGIN Sub numl = 20 END Sub Select the correct output when both programs are run. Program 1 Program 2 (A) 50 20 (B) 50 50 (C) 20 50 (D) 20 20
QUESTION 10 The table shown is named 'Planets' and is stored in a database. Name Moons Diameter Gravity Mean ar eC Which SQL query will return the name and mean temperature of any planet with a diameter less than 50 000 ordered in descending order of mean temperature? (A) (B) (C) (D) SELECT Name MeanTemperature FROM Planets WHERE Diameter < 50000 AND ORDER BY MeanTemperature DESC SELECT Name MeanTemperature FROM Planets WHERE Diameter < 50000 ORDER BY MeanTemperature DESCENDING SELECT Name MeanTemperature FROM Planets WHERE Diameter < 50000 ORDER BY MeanTemperature DESC SELECT Name MeanTemperature FROM Planets WHERE Diameter < 50000 AND ORDER BY MeanTemperature DESC
QUESTION 4 During a video call with a friend you notice a long delay between asking a question and your friend responding. This is most likely due to (A) jitter. (B) latency. (C) timeliness. (D) protocol standards.
QUESTION 14 (26 marks) a) Analyse Stimulus | in the stimulus book. Describe all the ways space line and tone are used and how visual hierarchy proximity and alignment have informed development of the match manager user interface. b) Evaluate Stimulus 1 to determine the data exchange components required for the app and explain the relationship between them. c) Using Stimulus 1 and 2 in the stimulus book make three justified recommendations based on survey feedback to improve data security of the match manager system. Recommendation and justification 1: Recommendation and justification 2: Recommendation and justification 3: d) Symbolise four changes to the login view that address all useability issues identified in Stimulus 2. Justify how useability principles have informed your changes. [6 marks] [6 marks] [6 marks] [8 marks]
QUESTION 7 The algorithm outputs a data set according to values a user inputs. BEGIN INPUT firstNum INPUT secondNum FOR j = 1 TO secondNum CALCULATE result = 1 * 5 1 2 3 4 FOR i = 1 TO firstNum 5 6 7 OUTPUT i * 93 = result 8 ENDFOR 9 ENDFOR 10 END If the user inputs firstNum = 6 and secondNum = 10 how many times would line 6 be executed? (A) 1 (B) 6 (C) 10 (D) 60
QUESTION 9 In a data dictionary where all the item types are numeric which item would be stored as a float? (A) shoeID (B) quantity (C) numSold (D) wholesalePrice
QUESTION 8 An open data set contains plain text of the facilities available in Queensland parks. To develop a mobile application that identifies basketball courts in a suburb it is necessary for data to be (A) retrieved normalised and verified. (B) retrieved normalised and validated. (C) normalised validated and encrypted. (D) retrieved modularised and validated.
QUESTION 5 Which encryption method uses a fixed shift of letters down the alphabet with a modulus operation? (A) Caesar (B) Vigenere (C) Gronsfeld (D) One-time pad
QUESTION 15 (25 marks) A school has developed a digital system to vote on student leadership positions. The system is incomplete and a few unprogrammed processes remain. Programmed components include: * aregistration and login feature using a universal password provided on voting day and their student or staff email address ¢ alist of candidates organised by nominated leadership positions ¢ the ability to cast votes ¢ the ability to count votes. Unprogrammed processes include site administration: ¢ distributing a universal password to registered users via email on voting day * importing candidate details and nominations in XML format ¢ checking/verifying votes ¢ publishing results. a) In XML format symbolise how data would be structured for Candidate X who is in Year 11 and has been nominated for esports captain. [4 marks] The voting rules for the system are: ¢ only students and staff can vote ¢ each user can only vote once ¢ voting takes place on a nominated day between 8:30 am and 4:00 pm. b) Explain system features that would ensure the implementation of the three voting rules. /3 marks] To maintain data integrity the school plans to integrate the voting system with the existing school database to access student and staff profiles. The school database contains all active user profiles and will enable identification of any conflicts of interest. A conflict of interest exists where a voter is related to a candidate e.g. staff cannot vote for their own children. c) Symbolise data flow for a programmed component that will allow all voting rules to be enforced while integrating the existing school database. [14 marks] d) Justify your response to Question 15c) by explaining the system interrelationships. [4 marks]
QUESTION 13 (9 marks) A one-time pad algorithm encrypts an 8-character word and outputs the result. The algorithm uses 0 as the first index in an array. There are four errors on lines 9 to 21 inclusive. 1 BEGIN 2 INPUT word 3 word = word converted to lowercase _ plainText = word converted to an array 5 //The GenerateOTPKey function will return an array of 8 random numbers 6 key = GenerateOTPKey () 7 cipherText = array of 8 blank characters 8 alphabet = lowercase alphabet converted to an array 9 FOR i =0 to 9 10 alphabetLocation = -1 11 FOR 3 =0 to 25 12 IF plainText[j] = alphabet [i] 13 alphabetLocation =] 14 ENDIF 15 ENDFOR 16 /Check if not found 17 IF alphabetLocation 2 0 THEN 18 cipherText[i] = alphabet (alphabetLocation + key[i])mod 26 19 ENDIF 20 ENDFOR 21 OUTPUT cipherText[i] 22 END Use pseudocode to correct the four errors on lines 9 to 21. Justify your response.
QUESTION 12 (5 marks) A dentist runs a mobile van for dental check-ups at school. Patient details and dental treatments are recorded on a computer in the van and patient data is transferred daily to a central server in the practice by email. The computer does not have a secure log-in system and all staff can access the email account since there is a rotating roster of staff. Patient confidentiality is important as some staff are parents of students at the school. Multiple personal data security needs are not being met by the current system. a) Evaluate the security impacts of the system to identify two personal data security needs. [3 marks] b) A VPN has been proposed to secure the van’s system. Describe a secure feature of a VPN and explain how this could improve data security. [2 marks]
QUESTION 11 (9 marks) A digital ticketing system has been created to manage ticket sales for a popular event where thousands of people are expected to log in over a short timeframe. To reduce load and keep user data secure the system follows the criteria: ¢ data size in data stores should be kept to a minimum ¢ data should be securely transmitted. a) Describe how data size and security can be managed to fulfil these criteria. [2 marks] Data size: Data security: b) Complete the algorithm using pseudocode to symbolise securing the user password and verifying the account username and password for the system. The algorithm must demonstrate the useability principle of safety. [7 marks] BEGIN INPUT username INPUT password
QUESTION 4 JSON is an effective exchange method for customer data across a networked system because (A) data structures are hierarchical and easily displayed on a website. (B) data can be tagged to associate with specific structures in a programming language. (C) data is human readable with code comments making it easier to understand in programming. (D) data is easily converted into various data structures suitable for specific programming languages.
QUESTION 3 The following algorithm is used to produce an output based on different input data values. BEGIN IF valuel > value2 PRINT A ELSE IF value3 S$ (valuel + value2) PRINT B ELSE PRINT C ENDIF ENDIF IF (value3 - valuel) 2 value2 PRINT D ENDIF END Identify the output produced by the algorithm when valuel = 7 value2 = 8 and value3 = 15. (A) AD (B) BC (C) CD (D) BD
QUESTION 4 A librarian uses a digital system to manage and monitor book borrowing. A friend of the librarian is desperate to borrow a book that is unavailable and asks the librarian for the details of the customer who has borrowed the book. Which Australian Privacy Principle would be breached if the librarian provided these details to their friend? (A) APP 2: Anonymity and pseudonymity (B) APP 4: Dealing with unsolicited personal information (C) APP 6: Use or disclosure of personal information (D) APP 13: Correction of personal information
QUESTION 7 Screen-based user interfaces must be dynamically adjustable because mobile phones televisions and other screens have different aspect ratios and dimensions. This is an example of which useability principle? (A) safety (B) utility (C) validity (D) reliability
QUESTION 14 (11 marks) The user interface symbolises a new smart home system that manages plugs to allow for efficient energy use. The home screen lists plugs alphabetically and annotations describe the function of each element. Schedules allow users to set on/off schedules for individual smart plugs and groups. Tap text to change plug or Screen title group name Add a new group ‘Add a new smart plu Home < Groups + Navigate back to Plug 1 previous screen Group 1 Group 1 HEL . Soup |__— #3 Press calendar icon on any screen to go to (+) Plug 2 ait Schedules screen Plug1 Plug2 Add Group 1 Press to add a New Group plug to a group EH) Add ail Plug 3 Add group OnOMa ail Press group name or Plug 4 ‘Add group’ to go to Add group Groups screen Press smart plug icon to force on/off On = white Off = grey a) Symbolise the user interface for the Schedules screen allowing for multiple on/off times per day and selecting any day of the week. Describe the function of each element. —_/7 marks/ b) Evaluate the user interface of the smart home system to recommend two additional features that could improve accessibility. Justify your response. [4 marks]
QUESTION 5 The data flow diagram describes a system for recording bird sightings. register login details login ueta’s researcher login details user details update bird count bird count participant user details user details user details (> user data user details bird data bird data bird data user details oo of bird data display data graphs tables and detailed bird data Which statement about the diagram is correct? (A) Participants can access detailed bird count data. (B) Login screens for researchers and participants will be different. (C) The data interface for researchers and participants will be different. (D) Administrators need to verify all users before they can access the system.
QUESTION 15 (31 marks) Digital Solutions students decide to generate an application to manage fundraising activities for their school. Students and staff need to be able to log in view items and their prices and select items for purchase. Payments will not be processed by the web application; payment details will be recorded in a database and processed manually by school administration staff. School administration staff manually add item details to the application as they are donated and purchased. Once an order has been placed stock availability should automatically update. School administration staff would also like to view order history to determine the popularity of items. a) Develop a data flow diagram to address all user needs and application requirements using the response space on the next page. [19 marks] b) The wireframe represents a user interface component of the fundraising application. Synthesise this wireframe and your response for Question 15a) to determine which processes have occurred in the system to result in this user interface. Justify your response with relevant interface elements. [4 marks] = School fundraising application Logged in as Username 2 Item name Item description $0.00 Item name Item description $0.00 c) What processes and data flows will occur when a user interacts with the user interface? Justify your response with relevant interface elements. [5 marks] d) Assuming the system is successfully implemented evaluate the personal social and economic impacts of this application. Refer to specific features of the application in your response. [3 marks] Personal: Social: Economic:
QUESTION 8 An algorithm is developed to establish a seating plan in a movie theatre so that individual bookings are always separated by two seats. To maximise ticket sales bookings of four or more guests are accepted immediately. Bookings for smaller groups are not confirmed until 2 hours before the movie starts. BEGIN SET seats = true //assume seats are available SET bookingConfirmed = false SET DateTime //current date and time INPUT movieStartTime INPUT guestNumber IF guestNumber < 4 AND IF movieStartTime —- DateTime >= 2 hours SET bookingPending = true ELSE IF guestNumber >= 4 THEN SET bookingConfirmed = true ENDIF ENDIF ENDIF BEGIN bookingPending //module to handle bookings for fewer than 4 guests END BEGIN bookingConfirmed //module to handle bookings for 4 or more guests END END The algorithm is incomplete. What is the best way to make the algorithm more efficient? (A) Use modularisation to suggest an alternative movieStartTime for bookingPending. (B) Add an algorithm to determine seat allocation ensuring groups sit two seats apart. (C) CalculatemovieStartTime - DateTime and set as a Boolean. (D) Use a FOR loop to check the parameters for bookingConfirmed.
QUESTION 4 Streaming requires real-time delivery of video and audio data. To ensure high-quality streaming for the viewer the frames must arrive in the correct order and with minimal delay. When developing such a system (A) latency and jitter must be minimised. (B) latency and jitter must be maximised. (C) latency must be maximised and jitter must be minimised. (D) latency must be minimised and jitter must be maximised.
QUESTION 7 Many symmetric encryption algorithms including the Data Encryption Standard (DES) use a structure commonly referred to as a Feistel network. Feistel networks have a symmetric structure used in the construction of block ciphers. The structure of a Feistel network is best described as a (A) cipher that uses public and private keys for secure encryption across networks. (B) cipher that uses a process of character substitution to encrypt or decrypt the same block of data. (C) very similar or identical set of iterative structural processes to encrypt or decrypt the same block of data. (D) _ structural process where plain text digits are combined with a stream of pseudorandom cipher digits.
QUESTION 2 Which encryption method is an example of asymmetric encryption? (A) DES (B) RSA (C) Blowfish (D) Triple DES
QUESTION 1 Which encryption method uses a private and public key to secure data during transmission over the internet? (A) AES (B) DES (C) RSA (D) Twofish
QUESTION 3 The FTP network protocol is used to (A) exchange files over the internet. (B) encrypt files exchanged over the internet. (C) tunnel data packets between a client and server. (D) create a secure connection between a client and server.
QUESTION 1 In data security a hash function can be described as a (A) one-way cryptographic algorithm that takes an input message of arbitrary length and produces a fixed-length digest. (B) cryptographic algorithm that performs the encryption or decryption of an input message of arbitrary length for output or storage. (C) feature that dynamically negotiates a mutual set of security requirements between two hosts that are attempting to communicate with each other. (D) process of masking password user input with hashes asterisks or other special characters.
QUESTION 2 The useability principle of utility can best be described as the ability of (A) different systems to present information in different ways to a single user. (B) different systems to present information in the same way to a single user. (C) asystem to be used by many different users. (D) asystem to do the work a user needs to do.
QUESTION 2 Screen-based user interfaces must dynamically adjust for different screen sizes because devices such as mobile phones and televisions have different aspect ratios and dimensions. Which useability principle does this demonstrate? (A) utility (B) safety (C) validity (D) reliability
QUESTION 2 A website’s content and functionality was evaluated using the following four criteria: operable e.g. the website should be navigable without a mouse and with a screen reader perceivable e.g. images should have text equivalents robust e.g. the website should work with different devices and navigation should be consistent understandable e.g. text should not be more complicated than it needs to be and the website should operate in a predictable manner. Identify the useability principle tested by the four criteria above. (A) effectiveness (B) accessibility (C) learnability (D) utility
No results found