view_agenda
Questions
Find the perfect question by filtering through every previous QCAA Digital Solutions external exam question
notifications
Question Classifications
We’re conducting a final review of the classifications and formatting for our recently onboarded questions. If you have any feedback, please share it with us here.
QUESTION 1 Asymmetric encryption algorithms (A) all use one key. (B) only use private keys. (C) havea block size of 64. (D) use different keys for encryption and decryption.
QUESTION 6 Complete the Caesar encryption algorithm with the correct statement at line 5. O BEGIN it INPUT userText AS STRING 2 INPUT userShift AS INTEGER 3 4 FOR each character IN userText 5 6 result = result + newCharacter 7 ENDFOR 8 OUTPUT result 9 END (A) newCharacter = userText + userShift (B) newCharacter = character + userShift (C) newCharacter = character - userShift (D) newCharacter = character + userShift MOD 26
QUESTION 7 Which data format supports structures including strings arrays numbers and Booleans in UTF-8 encoding? (A) SQL (B) XML (C) JSON (D) HTML
QUESTION 11 (2 marks) Explain the features of two network transmission protocols for transferring data between websites.
QUESTION 13 (12 marks) Refer to Stimulus 2 in the stimulus book. a) b) Use pseudocode to symbolise a one-time pad encryption algorithm with any lower case letters. Users must input the plain text and key. [7 marks] Evaluate the encryption algorithm developed in Question 13a) by performing a desk check. Use the plain text and key provided. Specify all inputs and outputs in table form. Plain text: Queens Key: ryjwah Example output: hsnanz [5 marks]
QUESTION 5 JSON uses human-readable text to transmit data objects. { name : John } { age :30 } { employees : [ John Anna Peter ]} { sale :true } The JSON data types in the code above would be declared as (A) John 30 John Sale. (B) name age employees sale. (C) char number list true/false. (D) string integer array of strings Boolean.
QUESTION 6 Which statement correctly describes the relationship between JSON and REST? (A) Both JSON and REST are formats used to exchange data. (B) JSON uses JavaScript object notation and REST uses XML. (C) JSON is a format used to exchange data through REST architecture. (D) JSON refers to the client side and REST refers to the server side of a data exchange.
QUESTION 4 During a video call with a friend you notice a long delay between asking a question and your friend responding. This is most likely due to (A) jitter. (B) latency. (C) timeliness. (D) protocol standards.
QUESTION 14 (26 marks) a) Analyse Stimulus | in the stimulus book. Describe all the ways space line and tone are used and how visual hierarchy proximity and alignment have informed development of the match manager user interface. b) Evaluate Stimulus 1 to determine the data exchange components required for the app and explain the relationship between them. c) Using Stimulus 1 and 2 in the stimulus book make three justified recommendations based on survey feedback to improve data security of the match manager system. Recommendation and justification 1: Recommendation and justification 2: Recommendation and justification 3: d) Symbolise four changes to the login view that address all useability issues identified in Stimulus 2. Justify how useability principles have informed your changes. [6 marks] [6 marks] [6 marks] [8 marks]
QUESTION 9 In a data dictionary where all the item types are numeric which item would be stored as a float? (A) shoeID (B) quantity (C) numSold (D) wholesalePrice
QUESTION 4 JSON is an effective exchange method for customer data across a networked system because (A) data structures are hierarchical and easily displayed on a website. (B) data can be tagged to associate with specific structures in a programming language. (C) data is human readable with code comments making it easier to understand in programming. (D) data is easily converted into various data structures suitable for specific programming languages.
QUESTION 4 A librarian uses a digital system to manage and monitor book borrowing. A friend of the librarian is desperate to borrow a book that is unavailable and asks the librarian for the details of the customer who has borrowed the book. Which Australian Privacy Principle would be breached if the librarian provided these details to their friend? (A) APP 2: Anonymity and pseudonymity (B) APP 4: Dealing with unsolicited personal information (C) APP 6: Use or disclosure of personal information (D) APP 13: Correction of personal information
QUESTION 7 Screen-based user interfaces must be dynamically adjustable because mobile phones televisions and other screens have different aspect ratios and dimensions. This is an example of which useability principle? (A) safety (B) utility (C) validity (D) reliability
QUESTION 15 (31 marks) Digital Solutions students decide to generate an application to manage fundraising activities for their school. Students and staff need to be able to log in view items and their prices and select items for purchase. Payments will not be processed by the web application; payment details will be recorded in a database and processed manually by school administration staff. School administration staff manually add item details to the application as they are donated and purchased. Once an order has been placed stock availability should automatically update. School administration staff would also like to view order history to determine the popularity of items. a) Develop a data flow diagram to address all user needs and application requirements using the response space on the next page. [19 marks] b) The wireframe represents a user interface component of the fundraising application. Synthesise this wireframe and your response for Question 15a) to determine which processes have occurred in the system to result in this user interface. Justify your response with relevant interface elements. [4 marks] = School fundraising application Logged in as Username 2 Item name Item description $0.00 Item name Item description $0.00 c) What processes and data flows will occur when a user interacts with the user interface? Justify your response with relevant interface elements. [5 marks] d) Assuming the system is successfully implemented evaluate the personal social and economic impacts of this application. Refer to specific features of the application in your response. [3 marks] Personal: Social: Economic:
QUESTION 4 Streaming requires real-time delivery of video and audio data. To ensure high-quality streaming for the viewer the frames must arrive in the correct order and with minimal delay. When developing such a system (A) latency and jitter must be minimised. (B) latency and jitter must be maximised. (C) latency must be maximised and jitter must be minimised. (D) latency must be minimised and jitter must be maximised.
QUESTION 7 Many symmetric encryption algorithms including the Data Encryption Standard (DES) use a structure commonly referred to as a Feistel network. Feistel networks have a symmetric structure used in the construction of block ciphers. The structure of a Feistel network is best described as a (A) cipher that uses public and private keys for secure encryption across networks. (B) cipher that uses a process of character substitution to encrypt or decrypt the same block of data. (C) very similar or identical set of iterative structural processes to encrypt or decrypt the same block of data. (D) _ structural process where plain text digits are combined with a stream of pseudorandom cipher digits.
QUESTION 2 Which encryption method is an example of asymmetric encryption? (A) DES (B) RSA (C) Blowfish (D) Triple DES
QUESTION 1 Which encryption method uses a private and public key to secure data during transmission over the internet? (A) AES (B) DES (C) RSA (D) Twofish
QUESTION 3 The FTP network protocol is used to (A) exchange files over the internet. (B) encrypt files exchanged over the internet. (C) tunnel data packets between a client and server. (D) create a secure connection between a client and server.
QUESTION 1 In data security a hash function can be described as a (A) one-way cryptographic algorithm that takes an input message of arbitrary length and produces a fixed-length digest. (B) cryptographic algorithm that performs the encryption or decryption of an input message of arbitrary length for output or storage. (C) feature that dynamically negotiates a mutual set of security requirements between two hosts that are attempting to communicate with each other. (D) process of masking password user input with hashes asterisks or other special characters.
QUESTION 2 The useability principle of utility can best be described as the ability of (A) different systems to present information in different ways to a single user. (B) different systems to present information in the same way to a single user. (C) asystem to be used by many different users. (D) asystem to do the work a user needs to do.
No results found