view_agenda
Questions
Find the perfect question by filtering through every previous QCAA Digital Solutions external exam question
notifications
Question Classifications
We’re conducting a final review of the classifications and formatting for our recently onboarded questions. If you have any feedback, please share it with us here.
QUESTION 8 A soccer club needs to develop a system for storing members’ data including: name address team membership type email address phone number. The secretary wants to email weekly newsletters to members. The treasurer wants to print membership lists and store yearly payment information. To produce this system the developer will need to generate a database design interfaces and develop coded modules to send emails. After adding and updating member details they will also need to (A) generate reports and process payments. (B) generate reports and provide secure logins for users. (C) process payments and provide secure logins for users. (D) generate reports process payments and provide secure logins for users.
QUESTION 7 An application accesses an API that obtains data relating to books read by users. The data that needs to be stored locally includes: * one or more images of each book’s cover ¢ book recommendation notes * acomment on each book. Book data is located using the ISBN — a unique identifier for each published book. When searching for a book the returned JSON data is outputted: { vyolumeInfo :{ title : Designing Relational Databases subtitle : A beginner’s guide authors : [ Joan Janson Katy Pratt l isbn : 1440569239562 Books Ltd 2016-05 publisher : publishedDate : pageCount :367 imageLinks ™: { smallThumbnail : http://books.abcd.com/books?id=jedfoYprny465&éimage=l&source=gbs _ api thumbnail : http://books.abcd.com/books?id=jedfoYprny465éimage=3&source=gbs api } } What is the most appropriate method to store the data in local tables so it can be easily retrieved for display? (A) ISBN pages authors comment recommendation (B) ISBN il © Boolean comments recommendation image link comments recommendation (0) Text Text Text comments recommendation publisher published date Table: images Jpg Integer image_link ISBN Table: authors Text Text Table: authors Table: authors
QUESTION 5 A business uses an online form to collect information about its customers. A customer has entered their tax file number in a comment area even though they were not required to provide this information. To comply with the Australian Privacy Principles (2014) the business should (A) encrypt this data. (B) delete this data immediately. (C) notify the customer that the data has been received. (D) notify the tax department that a data breach has occurred.
QUESTION 10 Which solution requirements help protect the integrity of customer order data when ordering online? (A) (B) (C) (D) Customers can only track their own parcels. Customers can track parcels using a parcel ID. All delivery messages contain a valid checksum. All delivery messages contain a valid hash function.
QUESTION 8 Analyse the user interface to determine a visible risk that affects the data security of the webpage owner. € > C | QO http:/www.example.com Downloads @ Filename.docx Pop-up advertisement C) Filename.pdf () Filename.exe gO @ Filename.app CLICK HERE () Filename.mov C) Filename.mp4 Email address* (A) The user interface has pop-up advertising. (B) The user interface hosts several documents for download. (C) The user interface requires user input of personal information. (D) The user interface uses the HTTP network transmission protocol.
QUESTION 1 Hashing increases security for data (A) storage. (B) encryption. (C) compression. (D) authentication.
QUESTION 14 (21 marks) Two novice programmers who live in different locations want to develop a method for securing their email communication. They have decided to: 1. meetin the same location 2. use a generic code library that contains functions relating to a set of cryptology algorithms called ‘Blowfish’ use only UTF-8 data encoding e.g. the character ‘%’ is considered to have a length of 8 bits in total create their own programs using different languages generate encrypted text using their programs Nw & copy and paste encrypted text into their emails. Blowfish key expansion Blowfish crypt BlowfishInitiate (key) Blowfish(Value KeySet Process-Type) Purpose Completes the initial key expansion | Completes the block algorithm process for processes. encryption or decryption. Returns a data structure called Accepts a 64-bit—length set of values in the form Blowfish KeySets. of text along with the pre-processed Blowfish KeySets. Inputs Key: text-based 64-bit in length Value: text-based 64-bit in length KeySet: returned data structure from the BlowfishInitiate function Process-Type: 1 for encrypt 2 for decrypt KeySet Text-based value BlowfishInitiate( J$8%*S#d ) | Blowfish( abcdefg MyKeySet 1) Note: If any input does not meet a function’s length requirements the function will fail and potentially cause a runtime error. a) Symbolise an algorithm that the programmers could use to encrypt their Unicode set of text. The algorithm should use the function library calls in the table as required. [6 marks] b) The programmers make the solution publicly available on their website as a web application. Explain and justify how they could implement two useability principles to optimise user experience. [6 marks] c) Evaluate whether the programmers have developed the most secure method to encrypt an email message by identifying two strengths and two weaknesses in the steps. Support all statements with examples. Provide two recommendations and justify how each recommendation would improve security. [9 marks]
QUESTION 5 Analyse the flow of data to identify the appropriate data security strategy to be performed at Z. Login details ; or Users —— Confirmation or rejection Username + Doctors passwond = + Confirmation or rejection Authenticated user details | Enter medical . . Patient medical Patient medical records —> records records (A) authentication (B) checksum (C) hashing (D) encryption
QUESTION 11 (13 marks) Business owners use an online platform to sell products. The essential features of the platform are listed. Platform: ¢ allows customers and business owners to register and log in ¢ has four data stores (customer data products shopping cart and orders) * processes order payments ¢ confirms orders with customers and business owners after successful payment. Customers: * register an account ¢ select products that appear in the shopping cart * may continue shopping after viewing the shopping cart. Business owners: * access confirmed orders * access customer account details ¢ update products and prices. Symbolise data flow for this system using a diagram that includes all essential features listed.
QUESTION 13 (5 marks) In an online silent auction items are posted on a public website and participants post a secret bid on the items they would like to purchase. Bidders cannot see each other’s bids. The bidding period is 7 consecutive days. At the end of the auction all bid values are revealed on the website and the highest bidder pays the amount they posted to obtain the item. a) Explain how checksums encryption and authentication would improve the security of the data exchange in this scenario. [3 marks] b) Recommend one encryption method to securely store auction data and justify your response. [2 marks]
QUESTION 11 (21 marks) The diagram shows the user interface for a drone control panel. Heading ‘ 200 m/hr Altitude Temperature mz C™AM —200 m/hr °C a) Explain how three elements and three principles of visual communication (excluding colour) have been used. [12 marks] b) Further develop the user interface to include five new features: camera views for Cameras | and 2 and readings for speed battery power and flight angle. [5 marks] c) Use four elements and principles of visual communication to justify in annotations on your diagram in 11b) the placement and visual appearance of the five new features of the user interface. [4 marks]
QUESTION 12 (18 marks) A mobile application (app) allows car owners to remotely unlock their cars if they lock the keys inside or their keys malfunction. Once users have created an account they can request a remote unlock by entering their username and password. The user data that is required to set up an account includes: full name date of birth home address driver licence number vehicle make model and colour vehicle registration. a) Analyse the information and evaluate risks to data confidentiality integrity and availability for this app. Justify your response with three examples. b) Identify a relevant Australian Privacy Principle and explain an ethical consideration when using app data. Australian Privacy Principle: Ethical consideration: c) You discover that the app uses a Caesar cipher to encrypt data allowing you to intercept a password in transit. Perform a desk check for five iterations to decrypt the password ‘KY IWW’. d) A friend is interested in learning more about encryption. Use pseudocode to symbolise a simple Caesar cipher as a demonstration. [6 marks] [2 marks] [2 marks] [8 marks]
QUESTION 13 (12 marks) Refer to Stimulus 2 in the stimulus book. a) b) Use pseudocode to symbolise a one-time pad encryption algorithm with any lower case letters. Users must input the plain text and key. [7 marks] Evaluate the encryption algorithm developed in Question 13a) by performing a desk check. Use the plain text and key provided. Specify all inputs and outputs in table form. Plain text: Queens Key: ryjwah Example output: hsnanz [5 marks]
QUESTION 15 (17 marks) Refer to Stimulus 2 in the stimulus book. Stimulus 2 is an extract from a university course database that shows enrolled students assessment items and student results for each assessment item. The following query was developed to show all students (by ID) and their overall subject result. SELECT ID SUM (Mark / 100) FROM Results Assess GROUP BY Item a) Evaluate the query and identify and describe any errors. [6 marks] b) Refine the query to ensure it functions correctly. Justify the refinements made. [7 marks] c) Refine the query in 15b) to show only students with a subject rank of ‘A’. [4 marks]
QUESTION 14 (6 marks) Refer to Stimulus 3 in the stimulus book. A secondary school stores encrypted student results in a database. To access their results students must log in using their student ID and password. Login details are checked against the database to ensure only authorised students can gain access. Passwords are encrypted for added security. Once logged in students must enter a public decryption key to have their results displayed. The database contains overall results for all subjects and students. Only results linked to the relevant student ID are displayed; students cannot view other students’ results. The algorithm for this system is incomplete. Complete the algorithm using the supplied code library. BEGIN GET studentID from input form GET password from input form GET key from input form
QUESTION 16 (24 marks) In security systems it is common practice to use a unique identifier of a numeric type for example a door lock code or PIN. People often store these numbers in an unsecured text file on personal devices. A simple encryption method for a two-digit number is shown below. é $ % A & * ( ) 3 4 5 6 7 718 8}19 of} 0 Plaintext Block key Encrypted Ciphertext number number character '4Q! 1 7 3 9 55 8 2 0 4 6 5 % 5! 12 3 4 5 6 7 8 9 0 6 “ Therefore the Plaintext number '45 ' would output Ciphertext '%*'. a) Develop a low-fidelity prototype solution key for any four-digit PIN (e.g. 7826) with associated key and predicted output. The algorithm must read data from a user input and output encrypted data to a file. Annotate the pseudocode in the table below to identify the location of assignment condition and modularisation. Evaluate the algorithm using a desk check and write the output at each step. [18 marks] Original Key Encrypted number Character b) Compare this encryption method with a standard Caesar cipher explaining three advantages and/or disadvantages of each method. Explain which of these two methods is the more secure method to use and justify your response. [6 marks]
QUESTION 12 (8 marks) Refer to Stimulus | in the stimulus book. a) Describe the listed algorithm constructs and identify one example of each from the stimulus. Use corresponding line numbers to identify examples. [6 marks] Assignment: Example: Condition: Example: Iteration: Example: b) Explain the purpose of modularisation and identify an example of how it is used in the stimulus. Use corresponding line numbers in your response. [2 marks]
QUESTION 11 (6 marks) Describe two elements of visual communication that can be implemented to enhance the user experience.
QUESTION 9 The following extract from a medical database shows patients vaccines by item number date vaccination is due date immunised and the risk of contracting the disease post-immunisation. Patients ID First 1684 John 2893 Mary 3642 Jackie 1206 Michael 1910 Midori 1934 Beatrice 1935 Wanda Assess Item Vaccine 1 Measles 2 Polio 3 Tetanus SELECT first FROM results r INNER JOIN assess a ON r.item = INNER JOIN patients p ON p.id = WHERE a.item in AND r.immunised < a.due ; Last Jones Smith Joyce Mentos Ono Thompson Granger Risk 0.001 0.00021 0.0005 last (1 2) The query above determines (A) (B) (C) (D) Due 1990-09-08 1990-10-21 1990-12-02 immunised Results Item \ DO Ww W W WwW W NY NHN NY KN WN a.item r.id ID 1684 2893 1206 1934 1935 3642 1684 3642 1934 2893 1935 3642 1934 2893 1935 1684 1206 Immunised 1990-09-08 1990-09-07 1990-09-08 1990-09-10 1990-09-06 1990-09-09 1990-10-21 1990-10-22 1990-10-21 1990-10-22 1990-10-21 1990-12-10 1990-12-08 1990-11-30 1990-11-30 1990-12-07 1990-12-11 Risk -001 .00021 .0005 .001 .0005 .00021 .0005 001 .0005 .0006 .00021 .0007 .O01 .0014 .00021 O01 004 o.UlUCOOlmlCO CO COT CT i TT i TT Tt Tt Tt TT Tt Tt lc Tt lO the first name last name and immunisation date for all patients who received items before they were due. the first name last name and immunisation date for patients who received Items | and 2 after they were due. the first name last name and immunisation date for patients who received Item | or Item 2 before it was due. the first name last name and immunisation date for patients who received Items 1 and 2 before they were due.
QUESTION 6 The following algorithm produces an output from input data. Main program BEGIN varl = 4 var3 = 3 process3() process2 (var3) processl () END Sub processl () BEGIN PRINT varl + 4 Sub END Sub process2 (var2) BEGIN PRINT 4 + var2 Sub END Sub process3 () BEGIN PRINT var3 / 3 Sub END The output of the pseudocode will be (A) 1744. (B) 1544. (C) 178. (D) 158.
QUESTION 10 The two algorithms below are for the ‘fizzbuzz’ test. The algorithms evaluate numbers between | and 100 and print: e ‘fizz’ if the number is a factor of 3 OR e ‘buzz’ if the number is a factor of 5 OR e ‘fizzbuzz’ if the number is a factor of both 3 and 5 OR e the original number if the number is a factor of neither 3 nor 5. Algorithm 1 Algorithm 2 BEGIN BEGIN i=] FOR i = 1 to 100 WHITE i <= 100 IF i modulus 3 = 0 IF i modulus 3 = 0 PRINT fizz PRINT ©1122 ENDIF ENDIF IF i modulus 5 = 0 IF i modulus 5 = 0 PRINT buzz ENDIF PRINT buzz IF NOT i modulus 3 = 0 ENDIF AND NOT i modulus 5 = 0 . . PRINT i IF i modulus 5 = 0 and i PRINT new line modulus 3 = 0 tj=-id¢il PRINT fizzbuzz ENDIF ENDWHILE ELSE . END PRINT 1 ENDIF PRINT new line NEXT END The algorithms were evaluated against the criteria of accuracy and reliability. Examine the algorithms and choose the statement that is true. (A) Algorithm | is more reliable than Algorithm 2. (B) Algorithm 2 is more reliable than Algorithm 1. (C) Algorithm | is more accurate than Algorithm 2. (D) Algorithm 2 is more accurate than Algorithm 1.
QUESTION 14 (13 marks) Use pseudocode to write an algorithm to determine whether a word contains two consecutive letters that are the same. Examples of words that contain two consecutive letters that are the same are ‘ball’ ‘moon’ and ‘possible’.
QUESTION 13 (18 marks) A medical practice is developing a system for their patient bookings and record keeping. A centralised database store will be implemented with access available from several medical practices across the city. The system will contain a variety of non-encrypted patient information (e.g. names and contact details) patient bookings encrypted patient medical records and doctor information. Doctors will be able to enter and edit all data but not bookings. Employees of each practice will be able to enter and edit patient information and bookings but not medical records. Patients will be able to enter and update their own patient information and enter and view their own bookings. a) Symbolise the practice’s networked database requirements in a high-level data flow diagram. The data flow diagram has been started for you below. [10 marks] Create/edit doctors Update patient details Bookings Create/edit medical records b) Explain two key security features required in this system and justify why you would include them. [8 marks]
QUESTION 8 Examine the following data flow diagram for a business that makes and sells widgets. Customer order Sales forecast Product ordered Product served . Production schedule Customer Production Employee Inventory Payment (3s Purchase order Order decisions Vendor Procurement Received goods Time worked Payroll From the diagram which of the following statements is most correct? (A) Production receives input based on other processes and entities. (B) This business consists of four main processes and three entities. (C) The sale process receives input from multiple sources. (D) Employees provide information to support the sale.
QUESTION 12 (17 marks) Refer to Stimulus | in the stimulus book. Pseudocode has been developed for a two-player ‘guess the number’ game. The game is played when: e Player | inputs a number ranging from and including 1 to 10 e Player 2 attempts to guess the number entered by Player |. Player 2 has three attempts to guess the correct number. a) The pseudocode contains errors. Analyse the pseudocode to identify and explain each error. Using the same variables make refinements to the pseudocode to correct the identified errors. [9 marks] b) Desk check your corrected algorithm by completing the test table below. Include any WRITE statements that are generated during testing. Assume Player | inputs the number 5 Player 2 is not able to correctly guess the answer during any of their attempts and all Player 2 inputs are valid. Player 1 | Loop Guess Value of input ‘Correct’ at Line 21 [S marks]
QUESTION 15 (25 marks) A school has developed a digital system to vote on student leadership positions. The system is incomplete and a few unprogrammed processes remain. Programmed components include: * aregistration and login feature using a universal password provided on voting day and their student or staff email address ¢ alist of candidates organised by nominated leadership positions ¢ the ability to cast votes ¢ the ability to count votes. Unprogrammed processes include site administration: ¢ distributing a universal password to registered users via email on voting day * importing candidate details and nominations in XML format ¢ checking/verifying votes ¢ publishing results. a) In XML format symbolise how data would be structured for Candidate X who is in Year 11 and has been nominated for esports captain. [4 marks] The voting rules for the system are: ¢ only students and staff can vote ¢ each user can only vote once ¢ voting takes place on a nominated day between 8:30 am and 4:00 pm. b) Explain system features that would ensure the implementation of the three voting rules. /3 marks] To maintain data integrity the school plans to integrate the voting system with the existing school database to access student and staff profiles. The school database contains all active user profiles and will enable identification of any conflicts of interest. A conflict of interest exists where a voter is related to a candidate e.g. staff cannot vote for their own children. c) Symbolise data flow for a programmed component that will allow all voting rules to be enforced while integrating the existing school database. [14 marks] d) Justify your response to Question 15c) by explaining the system interrelationships. [4 marks]
QUESTION 12 (5 marks) A dentist runs a mobile van for dental check-ups at school. Patient details and dental treatments are recorded on a computer in the van and patient data is transferred daily to a central server in the practice by email. The computer does not have a secure log-in system and all staff can access the email account since there is a rotating roster of staff. Patient confidentiality is important as some staff are parents of students at the school. Multiple personal data security needs are not being met by the current system. a) Evaluate the security impacts of the system to identify two personal data security needs. [3 marks] b) A VPN has been proposed to secure the van’s system. Describe a secure feature of a VPN and explain how this could improve data security. [2 marks]
QUESTION 11 (9 marks) A digital ticketing system has been created to manage ticket sales for a popular event where thousands of people are expected to log in over a short timeframe. To reduce load and keep user data secure the system follows the criteria: ¢ data size in data stores should be kept to a minimum ¢ data should be securely transmitted. a) Describe how data size and security can be managed to fulfil these criteria. [2 marks] Data size: Data security: b) Complete the algorithm using pseudocode to symbolise securing the user password and verifying the account username and password for the system. The algorithm must demonstrate the useability principle of safety. [7 marks] BEGIN INPUT username INPUT password
QUESTION 14 (11 marks) The user interface symbolises a new smart home system that manages plugs to allow for efficient energy use. The home screen lists plugs alphabetically and annotations describe the function of each element. Schedules allow users to set on/off schedules for individual smart plugs and groups. Tap text to change plug or Screen title group name Add a new group ‘Add a new smart plu Home < Groups + Navigate back to Plug 1 previous screen Group 1 Group 1 HEL . Soup |__— #3 Press calendar icon on any screen to go to (+) Plug 2 ait Schedules screen Plug1 Plug2 Add Group 1 Press to add a New Group plug to a group EH) Add ail Plug 3 Add group OnOMa ail Press group name or Plug 4 ‘Add group’ to go to Add group Groups screen Press smart plug icon to force on/off On = white Off = grey a) Symbolise the user interface for the Schedules screen allowing for multiple on/off times per day and selecting any day of the week. Describe the function of each element. —_/7 marks/ b) Evaluate the user interface of the smart home system to recommend two additional features that could improve accessibility. Justify your response. [4 marks]
QUESTION 5 The data flow diagram describes a system for recording bird sightings. register login details login ueta’s researcher login details user details update bird count bird count participant user details user details user details (> user data user details bird data bird data bird data user details oo of bird data display data graphs tables and detailed bird data Which statement about the diagram is correct? (A) Participants can access detailed bird count data. (B) Login screens for researchers and participants will be different. (C) The data interface for researchers and participants will be different. (D) Administrators need to verify all users before they can access the system.
QUESTION 15 (31 marks) Digital Solutions students decide to generate an application to manage fundraising activities for their school. Students and staff need to be able to log in view items and their prices and select items for purchase. Payments will not be processed by the web application; payment details will be recorded in a database and processed manually by school administration staff. School administration staff manually add item details to the application as they are donated and purchased. Once an order has been placed stock availability should automatically update. School administration staff would also like to view order history to determine the popularity of items. a) Develop a data flow diagram to address all user needs and application requirements using the response space on the next page. [19 marks] b) The wireframe represents a user interface component of the fundraising application. Synthesise this wireframe and your response for Question 15a) to determine which processes have occurred in the system to result in this user interface. Justify your response with relevant interface elements. [4 marks] = School fundraising application Logged in as Username 2 Item name Item description $0.00 Item name Item description $0.00 c) What processes and data flows will occur when a user interacts with the user interface? Justify your response with relevant interface elements. [5 marks] d) Assuming the system is successfully implemented evaluate the personal social and economic impacts of this application. Refer to specific features of the application in your response. [3 marks] Personal: Social: Economic:
QUESTION 8 An algorithm is developed to establish a seating plan in a movie theatre so that individual bookings are always separated by two seats. To maximise ticket sales bookings of four or more guests are accepted immediately. Bookings for smaller groups are not confirmed until 2 hours before the movie starts. BEGIN SET seats = true //assume seats are available SET bookingConfirmed = false SET DateTime //current date and time INPUT movieStartTime INPUT guestNumber IF guestNumber < 4 AND IF movieStartTime —- DateTime >= 2 hours SET bookingPending = true ELSE IF guestNumber >= 4 THEN SET bookingConfirmed = true ENDIF ENDIF ENDIF BEGIN bookingPending //module to handle bookings for fewer than 4 guests END BEGIN bookingConfirmed //module to handle bookings for 4 or more guests END END The algorithm is incomplete. What is the best way to make the algorithm more efficient? (A) Use modularisation to suggest an alternative movieStartTime for bookingPending. (B) Add an algorithm to determine seat allocation ensuring groups sit two seats apart. (C) CalculatemovieStartTime - DateTime and set as a Boolean. (D) Use a FOR loop to check the parameters for bookingConfirmed.
No results found